Analysis

  • max time kernel
    121s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22/04/2024, 02:08

General

  • Target

    b47a00214087e5c994873d7ce65e1cc51a9197b9b1e8e5367df923ff165de96e.exe

  • Size

    1.4MB

  • MD5

    650e37beb992156ad19d4b8a4ecfd36b

  • SHA1

    d226ed1809f22246adf7ffb82837a22b81dc0d57

  • SHA256

    b47a00214087e5c994873d7ce65e1cc51a9197b9b1e8e5367df923ff165de96e

  • SHA512

    22626e1d5dc1ce2a9ff6abc73fcbb363a4c280064141a286860c897e587fc85c8f5cb8404e4e191eddd6cfe9673e3dfc2f2d253a3a1b9ed9aade1b90ce16901c

  • SSDEEP

    24576:y30TAPIXPyGSoBNsIjfVeU8+HSrcn5L7BSjObTm+fuLMWiqqGMBMTR4JKftgIGlW:ykTeMKoBNsR+yrecOXmjLvqG0JcgIGo

Score
7/10
upx

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b47a00214087e5c994873d7ce65e1cc51a9197b9b1e8e5367df923ff165de96e.exe
    "C:\Users\Admin\AppData\Local\Temp\b47a00214087e5c994873d7ce65e1cc51a9197b9b1e8e5367df923ff165de96e.exe"
    1⤵
    • Loads dropped DLL
    PID:2044

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\TCL5B3A.tmp

    Filesize

    32KB

    MD5

    33399b6f8d4746c55e3163cba74a33cf

    SHA1

    01d1a5b7e3ff3238a45f51193d83edc082de175d

    SHA256

    364e96274ba405f2629136d48be599b360514269a8c19018c82e1e6e780adff9

    SHA512

    7a3092ea72c6059722ef7b2fdbb8b53bcbd8f7400425eadab40a92cf8835db06578b0cd5f7d8f99149afa7269d497bec1a18cb333ffc45ff01fda780e037d23e

  • \Users\Admin\AppData\Local\Temp\TCL5B7A.tmp

    Filesize

    104KB

    MD5

    e812af68a222f06e0828dec10a340c93

    SHA1

    c13879724d6db7fed76fefedf36975b549403e47

    SHA256

    e6e9dee541858cfc922907ff7b886bb5f257af02948d743249e6a9039f6df1c0

    SHA512

    8b0a2cc949cb323b3f89ee7c1f61b2a47a63e395c0b3036c4285001666f62a68761099cd998b25eccdb7c2460c64b0b117e6e2953c24086bbe7b6643162b9777

  • \Users\Admin\AppData\Local\Temp\TCL5BB9.tmp

    Filesize

    116KB

    MD5

    2a08422b0e553c409e627bf7dc83adfa

    SHA1

    63d376d179cce39c0bc8e820e4e803c21050f7a6

    SHA256

    40eca875e99058fd6ef6e088b8b4d9a08aafd21ec2244b33a24328e9ee458f65

    SHA512

    667419b3eb5c18d020d84d0f681512022463926f43f855ee20369504754b1e77665e8dcc13f53f41a2932139c963d0728d8a7fe7226541dcc51a907fee25f853

  • \Users\Admin\AppData\Local\Temp\TCL5C08.tmp

    Filesize

    116KB

    MD5

    7d7df9b313e247785e955e0c6f94af64

    SHA1

    08f6083ecb83a0016c3744c9eaed69057a8c8de7

    SHA256

    ee115631e785de39ec393b82cdef1c8beb587660a52648f3d140e05b42962da8

    SHA512

    3a1a79bde586f05f02e443fdabc46f9ecd7fcdc827cdfb983bb00c4352377106a3fa04bc4e8391789933dd80385a187d55cf5d4c572fa287a981e603e5e47d61

  • memory/2044-0-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/2044-6-0x0000000000250000-0x000000000026A000-memory.dmp

    Filesize

    104KB

  • memory/2044-10-0x0000000000270000-0x000000000028F000-memory.dmp

    Filesize

    124KB

  • memory/2044-14-0x00000000002B0000-0x00000000002CD000-memory.dmp

    Filesize

    116KB

  • memory/2044-20-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/2044-28-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB