Analysis

  • max time kernel
    91s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/11/2022, 21:58

General

  • Target

    a4a30da567934f353e986c73aa3c9eb44709aaf08072271ed9a7df2dcd1108a1.exe

  • Size

    4.9MB

  • MD5

    2872d4fdae8c6d69dd877efdfe5db0f6

  • SHA1

    420e09eaeb463126e8a36c58239692d4311b9fd4

  • SHA256

    a4a30da567934f353e986c73aa3c9eb44709aaf08072271ed9a7df2dcd1108a1

  • SHA512

    5ccb21c3cc03d490bfdebc44def0e3d7245c27d765b87c881eb84a4b3f47b2773018d47e14318f6aa7ace5b90986becfeec1fbdbdad6245df702557a1bdb1fc3

  • SSDEEP

    98304:XqWPLOlgHPuN6a1RkqDR6bhJMtTYdATVcJ1Kg8I/O0Z3ymNsNxGQA8hNGj5PSYS:5qiPW62Rj6LkYdATVcJ1KgK0Z3yKK

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4a30da567934f353e986c73aa3c9eb44709aaf08072271ed9a7df2dcd1108a1.exe
    "C:\Users\Admin\AppData\Local\Temp\a4a30da567934f353e986c73aa3c9eb44709aaf08072271ed9a7df2dcd1108a1.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4960

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4960-132-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/4960-134-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/4960-135-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/4960-137-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/4960-139-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/4960-141-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/4960-143-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/4960-145-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/4960-147-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/4960-149-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/4960-151-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/4960-153-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/4960-155-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/4960-157-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/4960-159-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/4960-161-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/4960-163-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/4960-165-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/4960-167-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/4960-169-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/4960-171-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/4960-173-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/4960-175-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/4960-176-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB