Analysis

  • max time kernel
    91s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/09/2022, 04:01

General

  • Target

    c097b0ccbf8d5053908f576cefc6e2d0.exe

  • Size

    1.5MB

  • MD5

    c097b0ccbf8d5053908f576cefc6e2d0

  • SHA1

    58cefdc642c169031b3b2e0331664ef97690b6f8

  • SHA256

    dd49ca48f2e4c45637d09f9f29faf5fe1ac59d1ac7a90a4c3838dc89c362b251

  • SHA512

    7f3aae105b76af84345b16388d847b5c921246efdb6c5691d1e1d3daa3bdc4b56c83d3d3964fae2fe52976eebf4d8631ab560ab73f65e205544e464e344625ac

  • SSDEEP

    24576:PITVKj8wqqqyqALbha3XoUlG4Ck8Pm3Zo+ov9Hab4ovsTWwb7cG3r:PqwgobhaplG41he+oF97TWwUA

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 26 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c097b0ccbf8d5053908f576cefc6e2d0.exe
    "C:\Users\Admin\AppData\Local\Temp\c097b0ccbf8d5053908f576cefc6e2d0.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4616

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4616-132-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4616-135-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4616-134-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4616-139-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4616-137-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4616-136-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4616-142-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4616-144-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4616-146-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4616-148-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4616-150-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4616-156-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4616-154-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4616-152-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4616-158-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4616-160-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4616-162-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4616-170-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4616-168-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4616-166-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4616-164-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4616-178-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4616-176-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4616-174-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4616-172-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4616-179-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB