Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2024, 04:58

General

  • Target

    83fae519b9c1bf3ef0815b7aefb3e98de3e28be3f3f43b66cedfafc74fdcec9f.exe

  • Size

    6.1MB

  • MD5

    fd1f23ca8f8f26499b7a926d42560d11

  • SHA1

    4796b11331d13f7b6d153511aae38e83fbad5371

  • SHA256

    83fae519b9c1bf3ef0815b7aefb3e98de3e28be3f3f43b66cedfafc74fdcec9f

  • SHA512

    49ff05c3abd61db7c5e688b2e2f3f56971131b181a2dff13c75a266af30d019b73f02d404c6e5b4fef6816488faa49b7f3714b5f48ff7f49d6d2b4109e617da8

  • SSDEEP

    98304:XomRTpoQB4MBuySrBqf4Y99ca17ZHDjmP38dQ0vXF2JW:hRBJuygY9KItGPsuqXF2I

Score
7/10
upx

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\83fae519b9c1bf3ef0815b7aefb3e98de3e28be3f3f43b66cedfafc74fdcec9f.exe
    "C:\Users\Admin\AppData\Local\Temp\83fae519b9c1bf3ef0815b7aefb3e98de3e28be3f3f43b66cedfafc74fdcec9f.exe"
    1⤵
    • Checks BIOS information in registry
    • Enumerates connected drives
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:1960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1960-0-0x0000000000400000-0x0000000001129800-memory.dmp

    Filesize

    13.2MB

  • memory/1960-3-0x0000000002C30000-0x0000000002CE7000-memory.dmp

    Filesize

    732KB

  • memory/1960-2-0x0000000000390000-0x0000000000391000-memory.dmp

    Filesize

    4KB

  • memory/1960-1-0x0000000000400000-0x0000000001129800-memory.dmp

    Filesize

    13.2MB

  • memory/1960-4-0x0000000000390000-0x0000000000391000-memory.dmp

    Filesize

    4KB

  • memory/1960-5-0x0000000002C30000-0x0000000002CE7000-memory.dmp

    Filesize

    732KB