Analysis

  • max time kernel
    90s
  • max time network
    99s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240508-en
  • resource tags

    arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    20/06/2024, 07:33

General

  • Target

    1146991bae4755d762ce256080b8e0618b435f027dd6f872d3106ea665c05050.exe

  • Size

    369KB

  • MD5

    50cc1aa14f6c5b5920b72e522297839f

  • SHA1

    f153f223e50d35bb4fde595bb441a9fcf6c56a55

  • SHA256

    1146991bae4755d762ce256080b8e0618b435f027dd6f872d3106ea665c05050

  • SHA512

    9e96f2e9ffe9936604938b928507b379b8cc7f495a3efd211eaf2b9dad5de67885f7a40c47f26d8eb5413d38e0b1cd329bcb68d54f632f08b302d159919be106

  • SSDEEP

    6144:LMJt6tTmWjp1P4xm0ovCs2Rh68815xYasf5eIltnaToecFHzpPoPWsbfaMv:K6tyWjX4LovCsYi5xYZheILnhXFTpqD/

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1146991bae4755d762ce256080b8e0618b435f027dd6f872d3106ea665c05050.exe
    "C:\Users\Admin\AppData\Local\Temp\1146991bae4755d762ce256080b8e0618b435f027dd6f872d3106ea665c05050.exe"
    1⤵
    • Enumerates connected drives
    PID:3736

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3736-0-0x0000000000600000-0x00000000006E5000-memory.dmp

          Filesize

          916KB

        • memory/3736-1-0x0000000000600000-0x00000000006E5000-memory.dmp

          Filesize

          916KB

        • memory/3736-3-0x0000000000600000-0x00000000006E5000-memory.dmp

          Filesize

          916KB