Analysis

  • max time kernel
    145s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 10:59

General

  • Target

    71a0964c41b11a95bf472a4b2108372d28492d30d4b2805e7d0419802553ffb8.exe

  • Size

    96KB

  • MD5

    2bbd1c430b3e84056a8854f6426e47f8

  • SHA1

    57f582a376828eab2b4799e94cd9d221034d7005

  • SHA256

    71a0964c41b11a95bf472a4b2108372d28492d30d4b2805e7d0419802553ffb8

  • SHA512

    115b82e540be5ec6a17c96ce50238d22b9ac72fea5f3a170b6b23fb4d9842a72faf2a02b5f879563f83864bb634691f6764fb3eec81c8726f24fd79b9e77fa44

  • SSDEEP

    3072:QaKtpdeoUynPBt+mEtLhiEHwpmbMR8Xj1:QaKt+oUy5wmEtjEmIyX

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\71a0964c41b11a95bf472a4b2108372d28492d30d4b2805e7d0419802553ffb8.exe
    "C:\Users\Admin\AppData\Local\Temp\71a0964c41b11a95bf472a4b2108372d28492d30d4b2805e7d0419802553ffb8.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3932
    • C:\Users\Admin\AppData\Local\Temp\71a0964c41b11a95bf472a4b2108372d28492d30d4b2805e7d0419802553ffb8.exe
      C:\Users\Admin\AppData\Local\Temp\71a0964c41b11a95bf472a4b2108372d28492d30d4b2805e7d0419802553ffb8.exe
      2⤵
        PID:3008

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/3008-136-0x0000000000400000-0x000000000040A000-memory.dmp

            Filesize

            40KB

          • memory/3008-138-0x0000000000400000-0x000000000040A000-memory.dmp

            Filesize

            40KB

          • memory/3008-139-0x0000000000400000-0x000000000040A000-memory.dmp

            Filesize

            40KB

          • memory/3008-140-0x0000000000400000-0x000000000040A000-memory.dmp

            Filesize

            40KB

          • memory/3008-142-0x0000000000400000-0x000000000040A000-memory.dmp

            Filesize

            40KB

          • memory/3008-143-0x0000000010000000-0x0000000010013000-memory.dmp

            Filesize

            76KB

          • memory/3932-132-0x0000000000400000-0x000000000047E000-memory.dmp

            Filesize

            504KB

          • memory/3932-141-0x0000000000400000-0x000000000047E000-memory.dmp

            Filesize

            504KB