Analysis

  • max time kernel
    19s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 18:48

General

  • Target

    458577fc2876d14c98f46653f8dba6071074d31d800afbf3b335113fcefa20ba.exe

  • Size

    5.0MB

  • MD5

    c1ee7f02c59a63b34e6e5736b6d8d1fb

  • SHA1

    09b397e0ea5bc8e2e5b6cd1bbb90c4729ff0512d

  • SHA256

    458577fc2876d14c98f46653f8dba6071074d31d800afbf3b335113fcefa20ba

  • SHA512

    67d374688e68e64df41456c2e4699dc64c8d9448593b9c485b6a7bd050d1b57d8fbf9270b186c6517fd267694900383fcabef42636a283e47752b1233b5e6bec

  • SSDEEP

    98304:o8lH5PUpqNfKFty7JZNEgzX5ujKB6RNYXA77pjfeHzuaPt9xsvI2bUNZD0/B:pA6fKSlrxzXYjpRWXA7pjOzu+n6vI9Y

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\458577fc2876d14c98f46653f8dba6071074d31d800afbf3b335113fcefa20ba.exe
    "C:\Users\Admin\AppData\Local\Temp\458577fc2876d14c98f46653f8dba6071074d31d800afbf3b335113fcefa20ba.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1152

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1152-54-0x0000000075881000-0x0000000075883000-memory.dmp

    Filesize

    8KB

  • memory/1152-55-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1152-56-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1152-57-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1152-59-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1152-61-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1152-63-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1152-65-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1152-67-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1152-69-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1152-71-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1152-77-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1152-75-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1152-79-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1152-73-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1152-81-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1152-85-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1152-87-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1152-91-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1152-93-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1152-95-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1152-89-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1152-83-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1152-97-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1152-98-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB