Analysis

  • max time kernel
    37s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/11/2022, 05:03

General

  • Target

    dcb11b33e7e55371f875faf0a69ca7bd610fcc09061f29df3b5925f156387c20.exe

  • Size

    569KB

  • MD5

    3180c002976d0ff85faa0f08f4cb1630

  • SHA1

    c151e7c104b36ff6a0a4c5f04533c731f3fbfbe3

  • SHA256

    dcb11b33e7e55371f875faf0a69ca7bd610fcc09061f29df3b5925f156387c20

  • SHA512

    bc03595df481469656951d8e7618c44c1d5028189d20e6739510a0a6984c925169620d445eee5b14a5eaf240c2904e7b2c7c89585165faa6e2a00e99fba7380e

  • SSDEEP

    12288:afmag2Q+iSE0IFjIiVsh2TyHvDA4Ysj4OQgj+6SPDgF4bZImR:oXRAv8PDHjdQg66SLgMImR

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dcb11b33e7e55371f875faf0a69ca7bd610fcc09061f29df3b5925f156387c20.exe
    "C:\Users\Admin\AppData\Local\Temp\dcb11b33e7e55371f875faf0a69ca7bd610fcc09061f29df3b5925f156387c20.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:1672

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1672-54-0x0000000075DA1000-0x0000000075DA3000-memory.dmp

    Filesize

    8KB

  • memory/1672-55-0x0000000000400000-0x0000000000577000-memory.dmp

    Filesize

    1.5MB

  • memory/1672-56-0x0000000000400000-0x0000000000577000-memory.dmp

    Filesize

    1.5MB