Analysis

  • max time kernel
    158s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 13:51

General

  • Target

    5321390f9c85a3379dab9c432d7d47c42db72152cca49707c9d718586902275c.exe

  • Size

    547KB

  • MD5

    59f8dc2dbd2c318f32e64ff85b32161b

  • SHA1

    42d358b452d907e373f6b1f262acdb14f53f4706

  • SHA256

    5321390f9c85a3379dab9c432d7d47c42db72152cca49707c9d718586902275c

  • SHA512

    4937cc777311298ff827edddab23516b90610a3f711670485b0d0cdd4c17f3dfb33c2730fcac3bcb2cbbb67ec344f6884da893cc0f016faec2998267173fd371

  • SSDEEP

    12288:V6SndthD54nyCCbrjj9CaHrb3Fig8RLtgVwgB83kFiJ6y0AA6+Pd92k79:gcHluc9CuX3v8RLKigikFiVBV6VZ

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5321390f9c85a3379dab9c432d7d47c42db72152cca49707c9d718586902275c.exe
    "C:\Users\Admin\AppData\Local\Temp\5321390f9c85a3379dab9c432d7d47c42db72152cca49707c9d718586902275c.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1436

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1436-132-0x0000000000400000-0x00000000004A7000-memory.dmp

    Filesize

    668KB

  • memory/1436-135-0x0000000000400000-0x00000000004A7000-memory.dmp

    Filesize

    668KB