Analysis

  • max time kernel
    31s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01/02/2023, 23:17

General

  • Target

    515701b8f5bdc39d417ace35001ba73ea6481a6e90f12a5b3a1b7c0e485bfe3b.exe

  • Size

    1.1MB

  • MD5

    064818470d2e0f263a673d5e7d351738

  • SHA1

    610f962effedc098cafe8952cfed5bebffbcb071

  • SHA256

    515701b8f5bdc39d417ace35001ba73ea6481a6e90f12a5b3a1b7c0e485bfe3b

  • SHA512

    2c0f19b5ef1103a70b8e93cb29e7ffbe2f86192214c5b150051f7fd3c454985cbee27f0ad83d35cc38b17dad4bad7e319ba63a9e5b388d787f9de81835968117

  • SSDEEP

    12288:AZsvXdjl8SOCMv5SA04k57WQCyuXpdWYR5nWFpPoSYXm1:Ay9erCOAAfkFW/XpdYbKXm1

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 26 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\515701b8f5bdc39d417ace35001ba73ea6481a6e90f12a5b3a1b7c0e485bfe3b.exe
    "C:\Users\Admin\AppData\Local\Temp\515701b8f5bdc39d417ace35001ba73ea6481a6e90f12a5b3a1b7c0e485bfe3b.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1356

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1356-54-0x00000000760A1000-0x00000000760A3000-memory.dmp

    Filesize

    8KB

  • memory/1356-55-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1356-58-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1356-57-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1356-60-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1356-62-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1356-59-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1356-66-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1356-64-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1356-70-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1356-68-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1356-74-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1356-72-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1356-76-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1356-80-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1356-78-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1356-82-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1356-86-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1356-84-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1356-90-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1356-88-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1356-92-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1356-94-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1356-96-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1356-98-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1356-100-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1356-101-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB