Analysis

  • max time kernel
    141s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-08-2023 21:26

General

  • Target

    efecb501a5aa672ac22003fdebe625ee0756d441e70edbc5c26b5e48af8b1f9c.exe

  • Size

    520KB

  • MD5

    4a57fb2f4d4661d0e980244b6ea80366

  • SHA1

    53350966bcf4e987bdea433ab6f1671ea591352a

  • SHA256

    efecb501a5aa672ac22003fdebe625ee0756d441e70edbc5c26b5e48af8b1f9c

  • SHA512

    41dd48d2f57a0d217e170066dcd966390d244cb02b65bb795229411f86cc0b71ddb8d2c9756b910c0469b117435408bb058814cc1621e616e6a93dc65ed5c9fc

  • SSDEEP

    12288:fw6IrDY8DXm6OekO42Yu/wYXvmwkGsZUkAeQbk1oAb:LeV/wY3kGsUvnbEoq

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 28 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\efecb501a5aa672ac22003fdebe625ee0756d441e70edbc5c26b5e48af8b1f9c.exe
    "C:\Users\Admin\AppData\Local\Temp\efecb501a5aa672ac22003fdebe625ee0756d441e70edbc5c26b5e48af8b1f9c.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4984

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4984-133-0x0000000000400000-0x0000000000543000-memory.dmp

    Filesize

    1.3MB

  • memory/4984-135-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4984-136-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4984-137-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4984-134-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4984-139-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4984-141-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4984-143-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4984-145-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4984-147-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4984-149-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4984-151-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4984-153-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4984-155-0x0000000000400000-0x0000000000543000-memory.dmp

    Filesize

    1.3MB

  • memory/4984-157-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4984-159-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4984-161-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4984-163-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4984-165-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4984-167-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4984-169-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4984-171-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4984-173-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4984-175-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4984-177-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4984-179-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4984-180-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4984-181-0x0000000000400000-0x0000000000543000-memory.dmp

    Filesize

    1.3MB