Analysis

  • max time kernel
    72s
  • max time network
    76s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    10/07/2023, 21:15

General

  • Target

    b088bb7bcd4cdfc4ab293650e7b7d0c1d88758e99106159690f8ce6a03399929.exe

  • Size

    4.9MB

  • MD5

    fc68602f4f8fc652853ade33321ef035

  • SHA1

    e01b7193e4b6722d232cb9640a131897f912a222

  • SHA256

    b088bb7bcd4cdfc4ab293650e7b7d0c1d88758e99106159690f8ce6a03399929

  • SHA512

    9be8d566b5e5ec23dc6c2cb75e343fd00120160ce53ee30c62ea3d8f53d2786df7d7ecbc0f313ad315708d388c7954146d78b643e15068287dc9b26ecb5d3971

  • SSDEEP

    49152:oqw4GmTUTYds48aBv0J4yoH4pDUua3Wvh+n6W/xsH6hVdWXh19gUY9x8CiNO4YNO:XduUIa39/6HUU00NbYN1cahaYG19V6y

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b088bb7bcd4cdfc4ab293650e7b7d0c1d88758e99106159690f8ce6a03399929.exe
    "C:\Users\Admin\AppData\Local\Temp\b088bb7bcd4cdfc4ab293650e7b7d0c1d88758e99106159690f8ce6a03399929.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1340

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1340-54-0x0000000180000000-0x0000000180040000-memory.dmp

    Filesize

    256KB

  • memory/1340-55-0x0000000180000000-0x0000000180040000-memory.dmp

    Filesize

    256KB

  • memory/1340-56-0x0000000180000000-0x0000000180040000-memory.dmp

    Filesize

    256KB