Analysis

  • max time kernel
    38s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2022 05:50

General

  • Target

    000cb70a9ce69d216a08548e84ed88a851db349e001079ca70d9f692438173e7.exe

  • Size

    2.4MB

  • MD5

    bb35ea9398c6a3e25b60e9f94e1bc1e0

  • SHA1

    19e94b0c1e9f12a1312d2309b0ee320f2ff01eb7

  • SHA256

    000cb70a9ce69d216a08548e84ed88a851db349e001079ca70d9f692438173e7

  • SHA512

    c8133fe9619a5128793b936eb2e3fbb0a9296a6f239d8c783c67ec1b27471e64f676a56ae470f66ecc51136402635a2c3915b523922ba5c20d30249b6f2e5c8c

  • SSDEEP

    24576:tGRR9aAiMLYY5SHsZIuAgH7zs63AaTFreGvlSL63AUzTpKSaaZU0lrM3EbhD0THG:teafY4BgT3AapvsGgalAEl6aFN

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\000cb70a9ce69d216a08548e84ed88a851db349e001079ca70d9f692438173e7.exe
    "C:\Users\Admin\AppData\Local\Temp\000cb70a9ce69d216a08548e84ed88a851db349e001079ca70d9f692438173e7.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1928

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1928-54-0x00000000762B1000-0x00000000762B3000-memory.dmp

    Filesize

    8KB

  • memory/1928-55-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1928-57-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1928-56-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1928-61-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1928-59-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1928-63-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1928-65-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1928-69-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1928-67-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1928-71-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1928-73-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1928-75-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1928-77-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1928-79-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1928-81-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1928-83-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1928-85-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1928-87-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1928-89-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1928-91-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1928-93-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1928-95-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1928-97-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1928-98-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB