Analysis

  • max time kernel
    78s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/02/2023, 20:44

General

  • Target

    3af6932bad2b86aaeacc5797519dc5a78580cdc60173f14ea379b8431e704334.exe

  • Size

    2.4MB

  • MD5

    369a32be1130150c1f45137d32126867

  • SHA1

    9005d8aed8f2cc0b1212ea61e4e8d487be0c75cf

  • SHA256

    3af6932bad2b86aaeacc5797519dc5a78580cdc60173f14ea379b8431e704334

  • SHA512

    af35d057c97e0e75301fe7997737c8d0259296d6e27e7c7669aa688eeafceb53967ff87e9471016689c704709a663a1d221145667d6481104712fa28860e4997

  • SSDEEP

    49152:lu0BqUz/0h0qMYvc/BL8pv3lSgPtXnRIpUbFwaDDCgv+FQJ8VFnd:B/i0qMYEJL8N3lSCRRlyaDD02kFnd

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3af6932bad2b86aaeacc5797519dc5a78580cdc60173f14ea379b8431e704334.exe
    "C:\Users\Admin\AppData\Local\Temp\3af6932bad2b86aaeacc5797519dc5a78580cdc60173f14ea379b8431e704334.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:3168

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3168-132-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3168-134-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3168-133-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3168-136-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3168-138-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3168-140-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3168-142-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3168-144-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3168-146-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3168-148-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3168-150-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3168-152-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3168-154-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3168-156-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3168-158-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3168-160-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3168-162-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3168-164-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3168-166-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3168-168-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3168-170-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3168-172-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3168-174-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3168-175-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB