Analysis

  • max time kernel
    43s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 16:00

General

  • Target

    0a3e5b572908df1bde58bdff607284a73b17e54453674fd7e6e8f7db425a97eb.exe

  • Size

    179KB

  • MD5

    05ae50c1147751ebb890ab2a57c74720

  • SHA1

    97ba900be423527d0226b9ee7b79d0f8eee25331

  • SHA256

    0a3e5b572908df1bde58bdff607284a73b17e54453674fd7e6e8f7db425a97eb

  • SHA512

    f8c965548ad5506d4e03abb4fa4eb2b243d09b3a3af38427cd48aae06eaecb709526d130abdb3103505bc450650499651f386b36633cf1a5669d030a953c0e95

  • SSDEEP

    3072:YtWGRBAGvY6EMwCmWOJcyFTBfttg5SUq+MEICIOGDAD:Y1zvZiZFJcyFTBlWMEHIOEA

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a3e5b572908df1bde58bdff607284a73b17e54453674fd7e6e8f7db425a97eb.exe
    "C:\Users\Admin\AppData\Local\Temp\0a3e5b572908df1bde58bdff607284a73b17e54453674fd7e6e8f7db425a97eb.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1672

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1672-54-0x0000000075201000-0x0000000075203000-memory.dmp

    Filesize

    8KB

  • memory/1672-55-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB