Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/01/2023, 19:38

General

  • Target

    ced3cf08661f9fd0fd4192ac49f2bc6b5cdc1f45a14b03dbf40661ae7f6975c0.exe

  • Size

    4.9MB

  • MD5

    0e97c7109ddd0bf547e472db846834c4

  • SHA1

    c29d87b40052e7a7b23a4aa84ae7f21ff014f083

  • SHA256

    ced3cf08661f9fd0fd4192ac49f2bc6b5cdc1f45a14b03dbf40661ae7f6975c0

  • SHA512

    8377b9e76c3431787e9e74b24e29f8c7274678893a9d93a3691bdf18d1305ab3b4a4570bd5d7177663055312fe7bfaf94992ab6daa4da1d9c9b75c2cd2d01c55

  • SSDEEP

    49152:X4vihZi7UKfcYbLrVj9PbDTIfg6VKGCpdQ:Ivihw7UKhnDl6VK1pdQ

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ced3cf08661f9fd0fd4192ac49f2bc6b5cdc1f45a14b03dbf40661ae7f6975c0.exe
    "C:\Users\Admin\AppData\Local\Temp\ced3cf08661f9fd0fd4192ac49f2bc6b5cdc1f45a14b03dbf40661ae7f6975c0.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4332

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4332-133-0x00000000044C0000-0x00000000044D3000-memory.dmp

          Filesize

          76KB

        • memory/4332-132-0x0000000004470000-0x00000000044A6000-memory.dmp

          Filesize

          216KB