Analysis

  • max time kernel
    137s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2023, 20:47

General

  • Target

    bde83f2f0a50ebb5bff7255133da86e14df5249e00e4fa8049ac0da27af865a2.exe

  • Size

    1.6MB

  • MD5

    8a3d5f0a26e7ea523c8da692ee7bf66a

  • SHA1

    21e762677da39d2d234cec2a3d0c6d43187b11b9

  • SHA256

    bde83f2f0a50ebb5bff7255133da86e14df5249e00e4fa8049ac0da27af865a2

  • SHA512

    0258cd5548984dc795191af8b0b0e51b6c1f09477884222084cb5c5eacd9752f8ae76588d85220955af01d516f30956b5a9647c4ee196b58002d87c0fe4233a3

  • SSDEEP

    24576:pDo6eaobVreJZJSezUtqo8uTOi78RB3vPEKZS0nWCTEXHZ5dK+B:pZEDyuTOiYPEKZtTTEXNB

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bde83f2f0a50ebb5bff7255133da86e14df5249e00e4fa8049ac0da27af865a2.exe
    "C:\Users\Admin\AppData\Local\Temp\bde83f2f0a50ebb5bff7255133da86e14df5249e00e4fa8049ac0da27af865a2.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    PID:4300

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4300-133-0x0000000002660000-0x0000000002696000-memory.dmp

    Filesize

    216KB

  • memory/4300-134-0x0000000002800000-0x0000000002813000-memory.dmp

    Filesize

    76KB

  • memory/4300-135-0x0000000003570000-0x0000000003571000-memory.dmp

    Filesize

    4KB

  • memory/4300-136-0x0000000005990000-0x0000000005991000-memory.dmp

    Filesize

    4KB

  • memory/4300-137-0x0000000005970000-0x0000000005971000-memory.dmp

    Filesize

    4KB

  • memory/4300-138-0x0000000005910000-0x0000000005911000-memory.dmp

    Filesize

    4KB

  • memory/4300-139-0x0000000005A30000-0x0000000005A31000-memory.dmp

    Filesize

    4KB

  • memory/4300-140-0x0000000005930000-0x0000000005931000-memory.dmp

    Filesize

    4KB

  • memory/4300-141-0x00000000059D0000-0x00000000059D1000-memory.dmp

    Filesize

    4KB

  • memory/4300-143-0x0000000002660000-0x0000000002696000-memory.dmp

    Filesize

    216KB

  • memory/4300-142-0x00000000059F0000-0x00000000059F1000-memory.dmp

    Filesize

    4KB

  • memory/4300-144-0x0000000002660000-0x0000000002696000-memory.dmp

    Filesize

    216KB

  • memory/4300-145-0x0000000002800000-0x0000000002813000-memory.dmp

    Filesize

    76KB