Analysis

  • max time kernel
    80s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 20:50

General

  • Target

    鬼谷太极.exe

  • Size

    5.3MB

  • MD5

    b589f4dcb54f63c8b2a6bd887d9383d7

  • SHA1

    baf75093b55a95dcac7b911fdee242a8b2458306

  • SHA256

    90b8eb2ea55577c2fcbdb63dabb022ab9063e4ea8d405d4c37e6110d2893e8e5

  • SHA512

    67cdbd50e2b9f7c3ca4ad61a1c34312b7dd2d5bb36a0172d662faf9d591ae67170943e7436f88f1d30381148d33c439c7542aba2067bad15c6cef9b0133389f9

  • SSDEEP

    98304:klf1vPw9JH7eOKQgze5UOVUNaWcmafc5R6eAubMetA1cIqwyoabDSLrzpbPxfUOV:21w9JH9O/M05QKxAtqwyoakNPxklmkWZ

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\鬼谷太极.exe
    "C:\Users\Admin\AppData\Local\Temp\鬼谷太极.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1512

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1512-54-0x0000000074F01000-0x0000000074F03000-memory.dmp

    Filesize

    8KB

  • memory/1512-55-0x0000000000400000-0x00000000009C8000-memory.dmp

    Filesize

    5.8MB

  • memory/1512-56-0x0000000000400000-0x00000000009C8000-memory.dmp

    Filesize

    5.8MB