Analysis

  • max time kernel
    187s
  • max time network
    197s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/10/2022, 15:06

General

  • Target

    52dfc564b18864ee360bc66e2c1f70fa9439df7175d26b813917ec2867a774d5.exe

  • Size

    96KB

  • MD5

    8281f0ba623335dbb36bdb8ac2970592

  • SHA1

    c4f78d37b5cd86f22491ffae009b0739e6b657d1

  • SHA256

    52dfc564b18864ee360bc66e2c1f70fa9439df7175d26b813917ec2867a774d5

  • SHA512

    a2c373d0a6c178d6a36831ed790cc4d509ad80267783f11cd6c55cf29b5c66a5c049593260047b35b28a7e6811aea51e77a3965bb5c4cf09b668cc476c29c2fe

  • SSDEEP

    1536:HIFh0hhDf4LHiuw21U2GOxvc/AQmT5Dx9Tyq+jDeTL1W5Tl664CNAG:f7DfcF1U2dxvxDx9T3+56dCqG

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\52dfc564b18864ee360bc66e2c1f70fa9439df7175d26b813917ec2867a774d5.exe
    "C:\Users\Admin\AppData\Local\Temp\52dfc564b18864ee360bc66e2c1f70fa9439df7175d26b813917ec2867a774d5.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3148
    • C:\Users\Admin\AppData\Local\Temp\52dfc564b18864ee360bc66e2c1f70fa9439df7175d26b813917ec2867a774d5.exe
      C:\Users\Admin\AppData\Local\Temp\52dfc564b18864ee360bc66e2c1f70fa9439df7175d26b813917ec2867a774d5.exe
      2⤵
        PID:2272

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2272-133-0x0000000000400000-0x0000000002728000-memory.dmp

      Filesize

      35.2MB

    • memory/2272-136-0x0000000000400000-0x0000000002728000-memory.dmp

      Filesize

      35.2MB

    • memory/2272-137-0x0000000000400000-0x0000000002728000-memory.dmp

      Filesize

      35.2MB

    • memory/2272-138-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/3148-134-0x0000000002230000-0x0000000002234000-memory.dmp

      Filesize

      16KB