Analysis

  • max time kernel
    143s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/08/2023, 06:31

General

  • Target

    92fa8c33ec5477f378bce238fb7796081cf23ac2e7a39c0e782e1d635e6ca5b0.exe

  • Size

    4.1MB

  • MD5

    ac8651573d2722142be084bfb7191fdb

  • SHA1

    6eb66f37f80ae9a428afb334584633c05deb0d47

  • SHA256

    92fa8c33ec5477f378bce238fb7796081cf23ac2e7a39c0e782e1d635e6ca5b0

  • SHA512

    24599be4f23b5b86791dde9a19f15332c4f89f420f8674745ff6fff417662027c7432d801a0191e43aa284aeb8a071b29807bea25a5d8d7fb537fe5b33c737b0

  • SSDEEP

    49152:jVj+f70QAvdbT2J93pjmOV67dydbRQwEkXee4R/YfD+s8KuqGaX0ToIBAUZLYNy:4T0QAv4pjmj5gE9fBJBAUZL3

Score
7/10
upx

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • UPX packed file 27 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\92fa8c33ec5477f378bce238fb7796081cf23ac2e7a39c0e782e1d635e6ca5b0.exe
    "C:\Users\Admin\AppData\Local\Temp\92fa8c33ec5477f378bce238fb7796081cf23ac2e7a39c0e782e1d635e6ca5b0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:228

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\speedhack-i386.dll

          Filesize

          177KB

          MD5

          f581898b2ff51c2ccca11993b693c628

          SHA1

          f3477f50a088579c7d132e7846848b4196b4f488

          SHA256

          4f612169a241a06e8a910fe2ecad6190e0958da0128d29b335064e68611aa26f

          SHA512

          08bb46a2cbcf8afd4222f57cc92cf10defb2639e850b7043cb3ccf5f67546567069004e31205ae9f8c52fe9816a3c6963b96b946121fc500c89925246de43294

        • C:\Users\Admin\AppData\Local\Temp\speedhack-i386.dll

          Filesize

          177KB

          MD5

          f581898b2ff51c2ccca11993b693c628

          SHA1

          f3477f50a088579c7d132e7846848b4196b4f488

          SHA256

          4f612169a241a06e8a910fe2ecad6190e0958da0128d29b335064e68611aa26f

          SHA512

          08bb46a2cbcf8afd4222f57cc92cf10defb2639e850b7043cb3ccf5f67546567069004e31205ae9f8c52fe9816a3c6963b96b946121fc500c89925246de43294

        • memory/228-161-0x0000000004380000-0x00000000043BE000-memory.dmp

          Filesize

          248KB

        • memory/228-165-0x0000000004380000-0x00000000043BE000-memory.dmp

          Filesize

          248KB

        • memory/228-143-0x0000000004380000-0x00000000043BE000-memory.dmp

          Filesize

          248KB

        • memory/228-145-0x0000000004380000-0x00000000043BE000-memory.dmp

          Filesize

          248KB

        • memory/228-146-0x00000000765B0000-0x00000000766A0000-memory.dmp

          Filesize

          960KB

        • memory/228-147-0x0000000004380000-0x00000000043BE000-memory.dmp

          Filesize

          248KB

        • memory/228-144-0x0000000004380000-0x00000000043BE000-memory.dmp

          Filesize

          248KB

        • memory/228-142-0x0000000004380000-0x00000000043BE000-memory.dmp

          Filesize

          248KB

        • memory/228-149-0x0000000004380000-0x00000000043BE000-memory.dmp

          Filesize

          248KB

        • memory/228-151-0x0000000004380000-0x00000000043BE000-memory.dmp

          Filesize

          248KB

        • memory/228-153-0x0000000004380000-0x00000000043BE000-memory.dmp

          Filesize

          248KB

        • memory/228-155-0x0000000004380000-0x00000000043BE000-memory.dmp

          Filesize

          248KB

        • memory/228-157-0x0000000004380000-0x00000000043BE000-memory.dmp

          Filesize

          248KB

        • memory/228-159-0x0000000004380000-0x00000000043BE000-memory.dmp

          Filesize

          248KB

        • memory/228-140-0x00000000765B0000-0x00000000766A0000-memory.dmp

          Filesize

          960KB

        • memory/228-139-0x0000000004380000-0x00000000043BE000-memory.dmp

          Filesize

          248KB

        • memory/228-169-0x00000000765B0000-0x00000000766A0000-memory.dmp

          Filesize

          960KB

        • memory/228-167-0x0000000004380000-0x00000000043BE000-memory.dmp

          Filesize

          248KB

        • memory/228-163-0x00000000765B0000-0x00000000766A0000-memory.dmp

          Filesize

          960KB

        • memory/228-170-0x0000000004380000-0x00000000043BE000-memory.dmp

          Filesize

          248KB

        • memory/228-172-0x0000000004380000-0x00000000043BE000-memory.dmp

          Filesize

          248KB

        • memory/228-174-0x0000000004380000-0x00000000043BE000-memory.dmp

          Filesize

          248KB

        • memory/228-176-0x0000000004380000-0x00000000043BE000-memory.dmp

          Filesize

          248KB

        • memory/228-178-0x0000000004380000-0x00000000043BE000-memory.dmp

          Filesize

          248KB

        • memory/228-180-0x0000000004380000-0x00000000043BE000-memory.dmp

          Filesize

          248KB

        • memory/228-182-0x0000000004380000-0x00000000043BE000-memory.dmp

          Filesize

          248KB

        • memory/228-184-0x0000000004380000-0x00000000043BE000-memory.dmp

          Filesize

          248KB

        • memory/228-186-0x0000000004380000-0x00000000043BE000-memory.dmp

          Filesize

          248KB

        • memory/228-188-0x0000000004380000-0x00000000043BE000-memory.dmp

          Filesize

          248KB

        • memory/228-190-0x0000000004380000-0x00000000043BE000-memory.dmp

          Filesize

          248KB

        • memory/228-191-0x0000000004380000-0x00000000043BE000-memory.dmp

          Filesize

          248KB