Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2023, 20:47

General

  • Target

    bde83f2f0a50ebb5bff7255133da86e14df5249e00e4fa8049ac0da27af865a2.exe

  • Size

    1.6MB

  • MD5

    8a3d5f0a26e7ea523c8da692ee7bf66a

  • SHA1

    21e762677da39d2d234cec2a3d0c6d43187b11b9

  • SHA256

    bde83f2f0a50ebb5bff7255133da86e14df5249e00e4fa8049ac0da27af865a2

  • SHA512

    0258cd5548984dc795191af8b0b0e51b6c1f09477884222084cb5c5eacd9752f8ae76588d85220955af01d516f30956b5a9647c4ee196b58002d87c0fe4233a3

  • SSDEEP

    24576:pDo6eaobVreJZJSezUtqo8uTOi78RB3vPEKZS0nWCTEXHZ5dK+B:pZEDyuTOiYPEKZtTTEXNB

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bde83f2f0a50ebb5bff7255133da86e14df5249e00e4fa8049ac0da27af865a2.exe
    "C:\Users\Admin\AppData\Local\Temp\bde83f2f0a50ebb5bff7255133da86e14df5249e00e4fa8049ac0da27af865a2.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    PID:2272

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2272-54-0x0000000000710000-0x0000000000746000-memory.dmp

    Filesize

    216KB

  • memory/2272-55-0x00000000025F0000-0x0000000002603000-memory.dmp

    Filesize

    76KB

  • memory/2272-56-0x0000000002B90000-0x0000000002B91000-memory.dmp

    Filesize

    4KB

  • memory/2272-58-0x0000000002E70000-0x0000000002E71000-memory.dmp

    Filesize

    4KB

  • memory/2272-57-0x0000000002EF0000-0x0000000002EF1000-memory.dmp

    Filesize

    4KB

  • memory/2272-59-0x0000000002ED0000-0x0000000002ED1000-memory.dmp

    Filesize

    4KB

  • memory/2272-61-0x0000000002E90000-0x0000000002E91000-memory.dmp

    Filesize

    4KB

  • memory/2272-60-0x0000000002FD0000-0x0000000002FD1000-memory.dmp

    Filesize

    4KB

  • memory/2272-62-0x0000000002F30000-0x0000000002F31000-memory.dmp

    Filesize

    4KB

  • memory/2272-63-0x0000000002F50000-0x0000000002F51000-memory.dmp

    Filesize

    4KB

  • memory/2272-64-0x0000000000710000-0x0000000000746000-memory.dmp

    Filesize

    216KB

  • memory/2272-65-0x0000000000710000-0x0000000000746000-memory.dmp

    Filesize

    216KB

  • memory/2272-66-0x00000000025F0000-0x0000000002603000-memory.dmp

    Filesize

    76KB