Analysis

  • max time kernel
    141s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    19-05-2023 04:34

General

  • Target

    64b16a883f5cee78c7cf7500a870c24f7a6bcd51c87fe6d443846c3492a8745d.exe

  • Size

    13KB

  • MD5

    8b44c50562010ba0e4c207952dbc9a12

  • SHA1

    e5593ed5bdf694d99e77637f20b895af4a0c2ee2

  • SHA256

    64b16a883f5cee78c7cf7500a870c24f7a6bcd51c87fe6d443846c3492a8745d

  • SHA512

    f23640dac3c3f13786814624737e50c3dfa822ae124523a72df4c9fadb8065e1eb035138ecc641d829b4ea46e2d029d712b10c78c3e07a892e5b9d30a1db357b

  • SSDEEP

    192:P8rz2CNzRHQTAHvULqtkeQAMh6NNpNNpuALo0F2:0eCNmTAHvU+i36NNpNNpe0F2

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\64b16a883f5cee78c7cf7500a870c24f7a6bcd51c87fe6d443846c3492a8745d.exe
    "C:\Users\Admin\AppData\Local\Temp\64b16a883f5cee78c7cf7500a870c24f7a6bcd51c87fe6d443846c3492a8745d.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1240

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1240-56-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1240-57-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB