Analysis

  • max time kernel
    142s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23/04/2024, 15:40

General

  • Target

    00496781632BBDMYDH.exe

  • Size

    663KB

  • MD5

    2cf7c8b589f49652043dbabcc8b44481

  • SHA1

    0d9ec6103245c8fecd5414e8adaed8dbd2b2011d

  • SHA256

    f1cdb30887c19f473dd83faaad255f7e5b70d98f1722288d7398175e89a44803

  • SHA512

    b3de6ba48815366e80e81ec1f6ccc99f96dc848434ac03030af48dce5ad33929714dfe28632c7fe5a0a659af7961bc68fba0e168f6c22ff15ae965ba70ea082f

  • SSDEEP

    12288:NYV6MorX7qzuC3QHO9FQVHPF51jgcgKNLJPBZ/QjmhsgsYulNeZELrZ:iBXu9HGaVHnZJr/QqhNsnrQU

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00496781632BBDMYDH.exe
    "C:\Users\Admin\AppData\Local\Temp\00496781632BBDMYDH.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2244

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Graff

    Filesize

    262KB

    MD5

    5fd7185e5b99ca235d00047757734d9a

    SHA1

    12bb706773b60f72279f971de973ade2df300782

    SHA256

    052e6e30e8c3ccfeecbbf3cc4e6bbead735b95470450ed956b199419403c64f8

    SHA512

    050b4b4f240b54f31f5f6d099e9b0a4688cd3777a18c81180334f5af746ab6e2f8c7eacc1f54fc7bdd3decf6567d2a581f95befcc4bb986c8172c49ba8a96dbe

  • memory/2244-0-0x0000000000190000-0x0000000000309000-memory.dmp

    Filesize

    1.5MB

  • memory/2244-12-0x0000000000120000-0x0000000000124000-memory.dmp

    Filesize

    16KB

  • memory/2244-13-0x0000000000190000-0x0000000000309000-memory.dmp

    Filesize

    1.5MB