Analysis

  • max time kernel
    162s
  • max time network
    192s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 21:32

General

  • Target

    a8ab1365b04a4c8705e57f112fabb792f89e34795149a55ac51e09a9d033b875.exe

  • Size

    73KB

  • MD5

    9d566d583a5c95bc7b4b384b81993a00

  • SHA1

    a3e315a607e80853dd8941b7958a77790cba316a

  • SHA256

    a8ab1365b04a4c8705e57f112fabb792f89e34795149a55ac51e09a9d033b875

  • SHA512

    79f8899c152fcff6e07394e4ca2c95bf0ed213a923c792790ec490d4cc8c26426de8241d7216c5c3e3015e264ed48d777b82b81c0767e7d8c8eeb9481b1d9a6d

  • SSDEEP

    1536:INcAKhXKk76oKSQkMWF4EXO+tAoqh/qmTdp0BmUmwGratQoQrI:Gc7hakGQb1FT+pzh/qmTf0MwG2QrI

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a8ab1365b04a4c8705e57f112fabb792f89e34795149a55ac51e09a9d033b875.exe
    "C:\Users\Admin\AppData\Local\Temp\a8ab1365b04a4c8705e57f112fabb792f89e34795149a55ac51e09a9d033b875.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1088

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1088-132-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB