Analysis

  • max time kernel
    152s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 08:39

General

  • Target

    douzhanshenxiaoliang/սС.exe

  • Size

    852KB

  • MD5

    f1ee198197adbf6fddbe29f522f58c8c

  • SHA1

    4bec5815b55690a5c69f5af5894566c36cfed581

  • SHA256

    03bf584dca3d676a2044a3f7062e2a69b6233c2368ac8de7c806c7d70d6e5876

  • SHA512

    2a0a19efedc9186c2be1932889622871d3f218e56fcdce3b9252e66941078470337b73e268fcb46a6a6937aa536c1295069f23173fba25695c3050321b9af2b9

  • SSDEEP

    12288:3aniS1QChHr051P3Demxv1A8+wizXa/JX20SdfaP5E1/SMZoSrF5KG9i:ZDvxNAJwizX1dfamQM/T4

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\douzhanshenxiaoliang\սС.exe
    "C:\Users\Admin\AppData\Local\Temp\douzhanshenxiaoliang\սС.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4676

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4676-132-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4676-133-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4676-134-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4676-136-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4676-138-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4676-140-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4676-142-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4676-144-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4676-146-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4676-148-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4676-150-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4676-152-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4676-154-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4676-156-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4676-158-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4676-160-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4676-162-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4676-164-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4676-166-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4676-168-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4676-170-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4676-172-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4676-174-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4676-175-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB