Analysis

  • max time kernel
    176s
  • max time network
    180s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/11/2022, 19:55

General

  • Target

    9d259a8b5e89d0e42d8a8b33ac8c6a9b7bed1f0cc8337371a99941744526ceda.exe

  • Size

    308KB

  • MD5

    411e799e30f0f523ba7bd56e24daec1e

  • SHA1

    6f982dc43e766f8aaddcf8340b223e5a4a7b88f6

  • SHA256

    9d259a8b5e89d0e42d8a8b33ac8c6a9b7bed1f0cc8337371a99941744526ceda

  • SHA512

    405f7b5676045b73599187a373d60fb89e59f491c967cc2c91761dcb2f7fb898c31eee797fe4447654181ee245fb7c2e97e73e412bf3f26d0fecc4487cba5f5d

  • SSDEEP

    6144:Pr5FErJz3+cfkLV4ETzfjFEptPnoVI51vQcJSUYxeZlfWq7d:Pr/EBnETzbFETPnoABQcJGxEdN

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d259a8b5e89d0e42d8a8b33ac8c6a9b7bed1f0cc8337371a99941744526ceda.exe
    "C:\Users\Admin\AppData\Local\Temp\9d259a8b5e89d0e42d8a8b33ac8c6a9b7bed1f0cc8337371a99941744526ceda.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2788

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2788-132-0x0000000000400000-0x00000000004EE000-memory.dmp

          Filesize

          952KB

        • memory/2788-133-0x0000000000400000-0x00000000004EE000-memory.dmp

          Filesize

          952KB