Analysis

  • max time kernel
    40s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2022, 20:17

General

  • Target

    2c78b9c1a80bfd76e5afca72d09e9a0459db2b75955363fc7a65ef24dc22819e.exe

  • Size

    4.9MB

  • MD5

    b6d23a61b6d8d2d884b7a0b8c1146d35

  • SHA1

    1940e67af2b596652c0b025ea01af732e6b784b0

  • SHA256

    2c78b9c1a80bfd76e5afca72d09e9a0459db2b75955363fc7a65ef24dc22819e

  • SHA512

    b03990b5fb8349fc238f6ca5b5f6e10dbfba20553ef9abc1c9a91d1fcaa0405bc8ccae653fc6d6e2ce9a14d886164566522390c10e7bb98b1cced208caf6d90b

  • SSDEEP

    98304:zJOtkkrLQhWEgwbamycpSInRbK6wbfTleUoTJmMGp0ZqCbtfAmnnliOeNW0cAUez:NckkrLcWEgQZfRbK60QJnT7nsO8DHG9

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c78b9c1a80bfd76e5afca72d09e9a0459db2b75955363fc7a65ef24dc22819e.exe
    "C:\Users\Admin\AppData\Local\Temp\2c78b9c1a80bfd76e5afca72d09e9a0459db2b75955363fc7a65ef24dc22819e.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1184

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1184-54-0x0000000074BB1000-0x0000000074BB3000-memory.dmp

    Filesize

    8KB

  • memory/1184-55-0x0000000000400000-0x0000000001265000-memory.dmp

    Filesize

    14.4MB

  • memory/1184-56-0x0000000000400000-0x0000000001265000-memory.dmp

    Filesize

    14.4MB