Analysis

  • max time kernel
    16s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22/07/2024, 04:57

General

  • Target

    62bbe8a99c2f0f84d469ebc65de3c7f0N.exe

  • Size

    423KB

  • MD5

    62bbe8a99c2f0f84d469ebc65de3c7f0

  • SHA1

    6a4fd45795c3e1f264b5007d5bb415b78eba544b

  • SHA256

    0a2074451143caac9612edca7935e4621e646219a46e77fe507eb57f8e63a504

  • SHA512

    d0752bad2d5f4a381986208d0848a4ad9b24a39feef18f3b0225112e94d0a1055bb98dc1c5341301889d88ab99a631727163fa50f141f2d2b9d65d58fe2edac9

  • SSDEEP

    3072:LmVW8iTX/3Rfl8Xq1+0cxxsWEL02fXcIp08Moe9DESZL1U4JkMPrh:SM7jJljxYTHYZM1vq4JkMF

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62bbe8a99c2f0f84d469ebc65de3c7f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\62bbe8a99c2f0f84d469ebc65de3c7f0N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    PID:2088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\macromd\ICQ Hackingtools.exe

    Filesize

    96KB

    MD5

    da7654b648e110fddfd56446bb971a6f

    SHA1

    dd04d39390e15787b218a7c84f4b96eff39981c6

    SHA256

    5fdaeaef2b447d00a03741f037db21d80030a96f93b478b29ec2fdef75975b7e

    SHA512

    fdac74c09b199efb3bd2f53e8d8e8f591a9b9cfab8a115fae7c98098e1826c7a629134061e67b4a507a170f3a3dd5fe15a74c9e8d1517838c4c9a82f2883317b

  • memory/2088-11-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/2088-34-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB