Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2023, 19:34

General

  • Target

    f0d8699ff6ab5c0219429e28194143f86d11305a8d0c3a3ec6e4e6aace83cc94.exe

  • Size

    8.9MB

  • MD5

    e972968bb6afe2162400a48c3090ad7a

  • SHA1

    6d5f25d18ff8f2dc9a07c28b5bdae98506f58b1d

  • SHA256

    f0d8699ff6ab5c0219429e28194143f86d11305a8d0c3a3ec6e4e6aace83cc94

  • SHA512

    4f3759a3cf088bb6e03967c3c0859c60621afa273de9816c6f158482801a13e8fda97ca49eda1a1d8cbf774730aaa705e5f783beb8db562ac3d90a4a4816ec24

  • SSDEEP

    98304:2BkKL6eQiVyO8n8PB4ioxjnrAIqJN67JVuuDIgh806FFlZCDrfOA+r:H+088nm4jjnfyNkJkgI7qDr7C

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0d8699ff6ab5c0219429e28194143f86d11305a8d0c3a3ec6e4e6aace83cc94.exe
    "C:\Users\Admin\AppData\Local\Temp\f0d8699ff6ab5c0219429e28194143f86d11305a8d0c3a3ec6e4e6aace83cc94.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:2828

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2828-54-0x0000000000400000-0x0000000000CDC000-memory.dmp

    Filesize

    8.9MB

  • memory/2828-55-0x0000000077290000-0x00000000772D7000-memory.dmp

    Filesize

    284KB

  • memory/2828-865-0x0000000002A20000-0x0000000002B31000-memory.dmp

    Filesize

    1.1MB

  • memory/2828-866-0x0000000002A20000-0x0000000002B31000-memory.dmp

    Filesize

    1.1MB

  • memory/2828-868-0x0000000002A20000-0x0000000002B31000-memory.dmp

    Filesize

    1.1MB

  • memory/2828-872-0x0000000002A20000-0x0000000002B31000-memory.dmp

    Filesize

    1.1MB

  • memory/2828-870-0x0000000002A20000-0x0000000002B31000-memory.dmp

    Filesize

    1.1MB

  • memory/2828-874-0x0000000002A20000-0x0000000002B31000-memory.dmp

    Filesize

    1.1MB

  • memory/2828-876-0x0000000002A20000-0x0000000002B31000-memory.dmp

    Filesize

    1.1MB

  • memory/2828-878-0x0000000002A20000-0x0000000002B31000-memory.dmp

    Filesize

    1.1MB

  • memory/2828-880-0x0000000002A20000-0x0000000002B31000-memory.dmp

    Filesize

    1.1MB

  • memory/2828-882-0x0000000002A20000-0x0000000002B31000-memory.dmp

    Filesize

    1.1MB

  • memory/2828-884-0x0000000002A20000-0x0000000002B31000-memory.dmp

    Filesize

    1.1MB

  • memory/2828-890-0x0000000002A20000-0x0000000002B31000-memory.dmp

    Filesize

    1.1MB

  • memory/2828-888-0x0000000002A20000-0x0000000002B31000-memory.dmp

    Filesize

    1.1MB

  • memory/2828-886-0x0000000002A20000-0x0000000002B31000-memory.dmp

    Filesize

    1.1MB

  • memory/2828-892-0x0000000002A20000-0x0000000002B31000-memory.dmp

    Filesize

    1.1MB

  • memory/2828-898-0x0000000002A20000-0x0000000002B31000-memory.dmp

    Filesize

    1.1MB

  • memory/2828-896-0x0000000002A20000-0x0000000002B31000-memory.dmp

    Filesize

    1.1MB

  • memory/2828-894-0x0000000002A20000-0x0000000002B31000-memory.dmp

    Filesize

    1.1MB

  • memory/2828-900-0x0000000002A20000-0x0000000002B31000-memory.dmp

    Filesize

    1.1MB

  • memory/2828-904-0x0000000002A20000-0x0000000002B31000-memory.dmp

    Filesize

    1.1MB

  • memory/2828-902-0x0000000002A20000-0x0000000002B31000-memory.dmp

    Filesize

    1.1MB

  • memory/2828-908-0x0000000002A20000-0x0000000002B31000-memory.dmp

    Filesize

    1.1MB

  • memory/2828-906-0x0000000002A20000-0x0000000002B31000-memory.dmp

    Filesize

    1.1MB

  • memory/2828-912-0x0000000002A20000-0x0000000002B31000-memory.dmp

    Filesize

    1.1MB

  • memory/2828-910-0x0000000002A20000-0x0000000002B31000-memory.dmp

    Filesize

    1.1MB

  • memory/2828-916-0x0000000002A20000-0x0000000002B31000-memory.dmp

    Filesize

    1.1MB

  • memory/2828-914-0x0000000002A20000-0x0000000002B31000-memory.dmp

    Filesize

    1.1MB

  • memory/2828-922-0x0000000002A20000-0x0000000002B31000-memory.dmp

    Filesize

    1.1MB

  • memory/2828-924-0x0000000002A20000-0x0000000002B31000-memory.dmp

    Filesize

    1.1MB

  • memory/2828-920-0x0000000002A20000-0x0000000002B31000-memory.dmp

    Filesize

    1.1MB

  • memory/2828-918-0x0000000002A20000-0x0000000002B31000-memory.dmp

    Filesize

    1.1MB

  • memory/2828-926-0x0000000002A20000-0x0000000002B31000-memory.dmp

    Filesize

    1.1MB

  • memory/2828-2601-0x0000000000E80000-0x0000000000F80000-memory.dmp

    Filesize

    1024KB

  • memory/2828-2602-0x0000000002700000-0x0000000002881000-memory.dmp

    Filesize

    1.5MB

  • memory/2828-4931-0x0000000000E80000-0x0000000000F80000-memory.dmp

    Filesize

    1024KB

  • memory/2828-8742-0x0000000002A20000-0x0000000002B31000-memory.dmp

    Filesize

    1.1MB

  • memory/2828-8743-0x0000000002B40000-0x0000000002C41000-memory.dmp

    Filesize

    1.0MB

  • memory/2828-8745-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2828-8791-0x0000000004150000-0x000000000418D000-memory.dmp

    Filesize

    244KB

  • memory/2828-8796-0x0000000000400000-0x0000000000CDC000-memory.dmp

    Filesize

    8.9MB

  • memory/2828-8798-0x0000000000400000-0x0000000000CDC000-memory.dmp

    Filesize

    8.9MB

  • memory/2828-8799-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB