Analysis

  • max time kernel
    145s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    25/05/2024, 16:49

General

  • Target

    0bc040c668d22bed7df1e3d80d54a525b243f4beffe7197a9414ff48fc778143.exe

  • Size

    8.6MB

  • MD5

    bc471aa8003024e1dbf68c7f183df4b3

  • SHA1

    27f83844d7cea0910507441cb2e9babe3c88ef13

  • SHA256

    0bc040c668d22bed7df1e3d80d54a525b243f4beffe7197a9414ff48fc778143

  • SHA512

    c1956ed80b6c8feb1cff6eccb233f4004ba1a4225517d5d76bef80d0114a24c35b3a3cbf86e25c0c76f0f780860596a0c7375652f12ff5319845180d88dd9e5a

  • SSDEEP

    196608:K3/NSnzJi2/aJAvcnbDROJkXijRtLvq1I7icdiiBYX:w8fyJ0AbtOJyERtLvM+3PBY

Score
7/10
upx

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0bc040c668d22bed7df1e3d80d54a525b243f4beffe7197a9414ff48fc778143.exe
    "C:\Users\Admin\AppData\Local\Temp\0bc040c668d22bed7df1e3d80d54a525b243f4beffe7197a9414ff48fc778143.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Users\Admin\AppData\Local\Temp\0bc040c668d22bed7df1e3d80d54a525b243f4beffe7197a9414ff48fc778143.exe
      "C:\Users\Admin\AppData\Local\Temp\0bc040c668d22bed7df1e3d80d54a525b243f4beffe7197a9414ff48fc778143.exe"
      2⤵
      • Checks BIOS information in registry
      • Enumerates connected drives
      • Checks processor information in registry
      • Enumerates system info in registry
      PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2848-36-0x0000000010000000-0x0000000010B45000-memory.dmp

    Filesize

    11.3MB

  • memory/2848-0-0x0000000000400000-0x0000000001100000-memory.dmp

    Filesize

    13.0MB

  • memory/2848-3-0x0000000010000000-0x0000000010B45000-memory.dmp

    Filesize

    11.3MB

  • memory/2848-2-0x0000000010000000-0x0000000010B45000-memory.dmp

    Filesize

    11.3MB

  • memory/2848-35-0x0000000000400000-0x0000000001100000-memory.dmp

    Filesize

    13.0MB

  • memory/2848-21-0x0000000005EA0000-0x0000000006BA0000-memory.dmp

    Filesize

    13.0MB

  • memory/2848-1-0x0000000000250000-0x0000000000253000-memory.dmp

    Filesize

    12KB

  • memory/2848-33-0x0000000010000000-0x0000000010B45000-memory.dmp

    Filesize

    11.3MB

  • memory/3044-39-0x0000000001100000-0x00000000013A5000-memory.dmp

    Filesize

    2.6MB

  • memory/3044-18-0x00000000013B0000-0x0000000001B1B000-memory.dmp

    Filesize

    7.4MB

  • memory/3044-27-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/3044-38-0x0000000000401000-0x00000000010FF000-memory.dmp

    Filesize

    13.0MB

  • memory/3044-31-0x0000000001100000-0x00000000013A5000-memory.dmp

    Filesize

    2.6MB

  • memory/3044-25-0x00000000013B0000-0x0000000001B1B000-memory.dmp

    Filesize

    7.4MB

  • memory/3044-6-0x0000000001100000-0x00000000013A5000-memory.dmp

    Filesize

    2.6MB

  • memory/3044-23-0x00000000013B0000-0x0000000001B1B000-memory.dmp

    Filesize

    7.4MB

  • memory/3044-20-0x00000000013B0000-0x0000000001B1B000-memory.dmp

    Filesize

    7.4MB

  • memory/3044-8-0x00000000013B0000-0x0000000001B1B000-memory.dmp

    Filesize

    7.4MB

  • memory/3044-14-0x00000000013B0000-0x0000000001B1B000-memory.dmp

    Filesize

    7.4MB

  • memory/3044-37-0x0000000000400000-0x0000000000F21000-memory.dmp

    Filesize

    11.1MB

  • memory/3044-12-0x00000000013B0000-0x0000000001B1B000-memory.dmp

    Filesize

    7.4MB

  • memory/3044-10-0x00000000013B0000-0x0000000001B1B000-memory.dmp

    Filesize

    7.4MB

  • memory/3044-29-0x0000000001100000-0x00000000013A5000-memory.dmp

    Filesize

    2.6MB

  • memory/3044-41-0x0000000001100000-0x00000000013A5000-memory.dmp

    Filesize

    2.6MB

  • memory/3044-40-0x0000000001100000-0x00000000013A5000-memory.dmp

    Filesize

    2.6MB

  • memory/3044-42-0x0000000000400000-0x0000000000F21000-memory.dmp

    Filesize

    11.1MB

  • memory/3044-43-0x0000000000400000-0x0000000000F21000-memory.dmp

    Filesize

    11.1MB

  • memory/3044-47-0x0000000001100000-0x00000000013A5000-memory.dmp

    Filesize

    2.6MB

  • memory/3044-48-0x0000000000400000-0x0000000000F21000-memory.dmp

    Filesize

    11.1MB

  • memory/3044-50-0x0000000000401000-0x00000000010FF000-memory.dmp

    Filesize

    13.0MB