Analysis

  • max time kernel
    81s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 09:33

General

  • Target

    UDP.exe

  • Size

    31KB

  • MD5

    161f6beec09cd33d710f8f97365ee6f6

  • SHA1

    9c408d1b53a1d03e8c7a3f85e050870f3d9a741f

  • SHA256

    f73a89b6a5c42d21ee4f7a4d79ad784cdfd896bbe2453b60cf9688786f7a9d98

  • SHA512

    e9f2afd6ad8216fa0f34cca29ba4d8753a03b187f4e9c29a0607e9b2ad932b788cb9a75db54df0db522e2a20d54a12992ed2396f40f06ab8cd76a89bcbf1e6be

  • SSDEEP

    384:+ubvs5ed2wcTZr5bDDOp61lpHwdkJAqJDPHYM:hshb9r5b3Op8lVbJTJwM

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\UDP.exe
    "C:\Users\Admin\AppData\Local\Temp\UDP.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4552

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4552-133-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4552-134-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB