Analysis

  • max time kernel
    101s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-10-2022 07:10

General

  • Target

    7e13b89ace2a2b41d2ce839d1168adc9f618549db1332197bc30f0623d09d998.exe

  • Size

    544KB

  • MD5

    5996edb79d0d4a180a15fdbbb46c8680

  • SHA1

    029894b3e2841347f60bb0aabee55c8fcff238de

  • SHA256

    7e13b89ace2a2b41d2ce839d1168adc9f618549db1332197bc30f0623d09d998

  • SHA512

    b7630f5d538a6d11de45edf4bfe41726fb44fa7609664c1697ea6205834ed0f40267cf4787187171246ddc6b996d9759dc498b4f58af01cc5769a6c8b12c08a9

  • SSDEEP

    12288:vn2BZYEKoSA1QwR3Pmti1slBJtqR+1ht4nW8OsI:v2Q7RAywR3Ai1slntqR+Xt4W8OsI

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e13b89ace2a2b41d2ce839d1168adc9f618549db1332197bc30f0623d09d998.exe
    "C:\Users\Admin\AppData\Local\Temp\7e13b89ace2a2b41d2ce839d1168adc9f618549db1332197bc30f0623d09d998.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4444

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4444-132-0x0000000000400000-0x0000000000566000-memory.dmp

    Filesize

    1.4MB

  • memory/4444-133-0x0000000000400000-0x0000000000566000-memory.dmp

    Filesize

    1.4MB