Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/07/2024, 05:48

General

  • Target

    dc6c03e35a2000b9f80dfadbeceb01f2c27b0d7c47a5671f8570a6ed2a992d1f.exe

  • Size

    9.8MB

  • MD5

    628018ea7ad39a0329f0573120b49330

  • SHA1

    5040250648d2a3d50804823f50630a8de38d5ccf

  • SHA256

    dc6c03e35a2000b9f80dfadbeceb01f2c27b0d7c47a5671f8570a6ed2a992d1f

  • SHA512

    f7632c1bed8a9565850b6ba35321cb64503fc866a5b8d557bac76d6427aff74deaf096720d2c65b19dd06fffc3de1b8739e769e267156e22b90b3e91f847444d

  • SSDEEP

    98304:lCCCCCCCCCCCCCCCCCCCCCCCCCCCCC+rrrrrrrrrrrrrrrGIIIIIIIIIIIIIIIIj:lCCCCCCCCCCCCCCCCCCCCCCCCCCCCCJ

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dc6c03e35a2000b9f80dfadbeceb01f2c27b0d7c47a5671f8570a6ed2a992d1f.exe
    "C:\Users\Admin\AppData\Local\Temp\dc6c03e35a2000b9f80dfadbeceb01f2c27b0d7c47a5671f8570a6ed2a992d1f.exe"
    1⤵
    • Drops file in System32 directory
    PID:836
  • C:\Windows\SysWOW64\svrwsc.exe
    C:\Windows\SysWOW64\svrwsc.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    PID:4876

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\svrwsc.exe

          Filesize

          10.2MB

          MD5

          fb4a03862c36c319b24fe48aa3d8472f

          SHA1

          07a96d98bab9c3b185811bd6b0c84b4b73bcad16

          SHA256

          afa3bc69f84f7f5fa8c451bb6bc4ef640ea3b64e5c7ac1255d80e54f82c4e252

          SHA512

          0395ef941cdff98d70d08d517a699e19fcd5bd6f855e923e7887eb5a1435533a9a245a89ae1e836d648deb3ff0a848fb799de31cbed573a7a07ebf057da2f5ff

        • memory/836-0-0x0000000000400000-0x000000000042B000-memory.dmp

          Filesize

          172KB

        • memory/836-1-0x0000000000401000-0x0000000000402000-memory.dmp

          Filesize

          4KB

        • memory/836-2-0x0000000000400000-0x000000000042B000-memory.dmp

          Filesize

          172KB

        • memory/836-9-0x0000000000400000-0x000000000042B000-memory.dmp

          Filesize

          172KB

        • memory/4876-6-0x0000000000400000-0x000000000042B000-memory.dmp

          Filesize

          172KB