Analysis

  • max time kernel
    271s
  • max time network
    399s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    26/11/2022, 21:40

General

  • Target

    սڵ.exe

  • Size

    5.4MB

  • MD5

    856b66482ffc77144201c290565a6d26

  • SHA1

    2c93e18833c846c65a48ef69dc8aad3676e9e8c9

  • SHA256

    5935b8c11c71bd83e9554c361bb8f58ad6691002811d42ab6bd57eb875bb9722

  • SHA512

    e1feebfcb7c9a2ea04eb4ed6ce2014cbbd0c74347103031a990df508f33ca24c07114da2b4d62a47a5e87296cb75e7476b42be57011209a0737a907c7285b6e1

  • SSDEEP

    98304:slfUAAIIBB2OW1a8tbsPi2U9oRSFG0VCJ+3SSsgQ8zfBGBbICtnqvRF+nERqh16p:ujAFaOymlWSyQ0ARFqzcD036/0M2Y60S

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\սڵ.exe
    "C:\Users\Admin\AppData\Local\Temp\սڵ.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:536

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/536-54-0x00000000757E1000-0x00000000757E3000-memory.dmp

          Filesize

          8KB

        • memory/536-55-0x0000000000400000-0x00000000009C8000-memory.dmp

          Filesize

          5.8MB

        • memory/536-56-0x0000000000400000-0x00000000009C8000-memory.dmp

          Filesize

          5.8MB