Analysis

  • max time kernel
    97s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/10/2022, 02:29

General

  • Target

    ab5c1dc3d6c3817e858f651999eed5d2dc57bd09e9f2a6ae114ddecf10ad6c6b.exe

  • Size

    358KB

  • MD5

    579578d8cac6a46cee97a25a3bd564e4

  • SHA1

    3bf47f144f1308a8e2cabb27bc35a572539eab42

  • SHA256

    ab5c1dc3d6c3817e858f651999eed5d2dc57bd09e9f2a6ae114ddecf10ad6c6b

  • SHA512

    48bb09157a108b142f39cc9650ff00bc38aeb3c7e6d86b9abaf4b3f6fc93ede2b3cfddcf68425cee6e85304308792ce807f34489ec0bbd1f25244f87b2a26a51

  • SSDEEP

    6144:tn6hMmDhDYcD0DL/4kS1KvqRa1AZy2C1otNO1LfLROyBKH5bOg3IgkVSTlkKoS:tn2yc+MT1oC+PhsqBKZf3I9ghoS

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab5c1dc3d6c3817e858f651999eed5d2dc57bd09e9f2a6ae114ddecf10ad6c6b.exe
    "C:\Users\Admin\AppData\Local\Temp\ab5c1dc3d6c3817e858f651999eed5d2dc57bd09e9f2a6ae114ddecf10ad6c6b.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1612

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1612-132-0x0000000000400000-0x00000000008D1000-memory.dmp

    Filesize

    4.8MB

  • memory/1612-135-0x0000000000400000-0x00000000008D1000-memory.dmp

    Filesize

    4.8MB