Analysis

  • max time kernel
    38s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 10:57

General

  • Target

    d8dd9084647f7777f757c25869bc75a1d27f879f3899b039eb0b7a372b510440.exe

  • Size

    200KB

  • MD5

    926a818f9c000afcfef70909087b5c65

  • SHA1

    6a5376bd9cb0d227559270dbb52e0d58996c3920

  • SHA256

    d8dd9084647f7777f757c25869bc75a1d27f879f3899b039eb0b7a372b510440

  • SHA512

    ec4ab3797bb0f9f6f9fe7b6115a650164e399075fdb7e5a5ac614bd667b500e27b73c1252d81fe94c5c0a2a0d98a6a7f43e7daf9f9de0859b5539943c19b9dd9

  • SSDEEP

    3072:Vl5Mstk8L12MztSTUBs5DWhXyr0vw3m4AV:VlRk8xLBs2c

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d8dd9084647f7777f757c25869bc75a1d27f879f3899b039eb0b7a372b510440.exe
    "C:\Users\Admin\AppData\Local\Temp\d8dd9084647f7777f757c25869bc75a1d27f879f3899b039eb0b7a372b510440.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1248

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1248-56-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB

        • memory/1248-57-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB