Analysis

  • max time kernel
    142s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08-04-2024 07:58

General

  • Target

    2fdadd44fa8ca62bd04728e2efa12aa1c97def0a4a3f1f414944d259c73c6675.exe

  • Size

    776KB

  • MD5

    1b28e9a5333b090279dfd0c36f78cd76

  • SHA1

    55133014f4f83b769b5d2e9b8f44fafcde893830

  • SHA256

    2fdadd44fa8ca62bd04728e2efa12aa1c97def0a4a3f1f414944d259c73c6675

  • SHA512

    ac558d09a8207b9141308aa8532e90611c3cfa99e68a7028d3d9e8159b45825ed8e8b53c0dbf677c39c5e1369b05fe2d57d45cdfbf6113058ca3e916f38a76a0

  • SSDEEP

    24576:6mjl2AcvvGFCAYMFwRy64FVwUR/1qHDS:6o2bGEAYkwo6gVZR/

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2fdadd44fa8ca62bd04728e2efa12aa1c97def0a4a3f1f414944d259c73c6675.exe
    "C:\Users\Admin\AppData\Local\Temp\2fdadd44fa8ca62bd04728e2efa12aa1c97def0a4a3f1f414944d259c73c6675.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:612
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 612 -s 1248
      2⤵
        PID:2200

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/612-0-0x000000013FC10000-0x000000013FDBC000-memory.dmp

      Filesize

      1.7MB

    • memory/612-1-0x0000000000140000-0x000000000017E000-memory.dmp

      Filesize

      248KB

    • memory/612-2-0x000007FEF5B00000-0x000007FEF64EC000-memory.dmp

      Filesize

      9.9MB

    • memory/612-3-0x000000001B0D0000-0x000000001B150000-memory.dmp

      Filesize

      512KB

    • memory/612-4-0x000000001B0D0000-0x000000001B150000-memory.dmp

      Filesize

      512KB

    • memory/612-5-0x000000001B0D0000-0x000000001B150000-memory.dmp

      Filesize

      512KB

    • memory/612-6-0x000000001B0D0000-0x000000001B150000-memory.dmp

      Filesize

      512KB

    • memory/612-10-0x000000001B0D0000-0x000000001B150000-memory.dmp

      Filesize

      512KB

    • memory/612-11-0x000000013FC10000-0x000000013FDBC000-memory.dmp

      Filesize

      1.7MB

    • memory/612-12-0x000007FEF5B00000-0x000007FEF64EC000-memory.dmp

      Filesize

      9.9MB

    • memory/612-13-0x000000001B0D0000-0x000000001B150000-memory.dmp

      Filesize

      512KB

    • memory/612-15-0x000000001B0D0000-0x000000001B150000-memory.dmp

      Filesize

      512KB

    • memory/612-16-0x000000001B0D0000-0x000000001B150000-memory.dmp

      Filesize

      512KB