Analysis

  • max time kernel
    25s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2022 17:09

General

  • Target

    d18210869c39b7fd0ef4340c9cfa39d8743e8ca3597e5a184ca7f24d80e1b4c5.exe

  • Size

    24KB

  • MD5

    b28c1f00d7d8a12fe91aafa4bce6193d

  • SHA1

    ad2db0376bb0fd84a2f4b107f863fa23e815185a

  • SHA256

    d18210869c39b7fd0ef4340c9cfa39d8743e8ca3597e5a184ca7f24d80e1b4c5

  • SHA512

    71dd1dcd804a0b48d087f95b0d25cd7551e714cb7ca8dcb2556a8821a43cf5a466d8797dcdabe63fc33ef2cb60cc9a7ef3c4ce4c17a530b18e21464924065ce1

  • SSDEEP

    384:SRKBL6Cu2BDLLd48fHi8HuLApqk3lpCrvpw6SYypbh/wnn:SRw6PgDu8XEApz3lpCCN1RFk

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d18210869c39b7fd0ef4340c9cfa39d8743e8ca3597e5a184ca7f24d80e1b4c5.exe
    "C:\Users\Admin\AppData\Local\Temp\d18210869c39b7fd0ef4340c9cfa39d8743e8ca3597e5a184ca7f24d80e1b4c5.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1728

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1728-56-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB