Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2023, 03:23

General

  • Target

    14c0c41d29fcbbc54629a01d2a1bc22f86d8446ab1896eef5acb495a8949acbd.exe

  • Size

    1.9MB

  • MD5

    80b668c6282aabff11ae8c63641cff8d

  • SHA1

    af42b54ccdbdaa7b75399fa39f7694a3ba7d79c4

  • SHA256

    14c0c41d29fcbbc54629a01d2a1bc22f86d8446ab1896eef5acb495a8949acbd

  • SHA512

    d63da69b30e5a0dabf1ec456728ab8de143e0118783550aa39181c56adfcf995c1e0009fc6943412d9603775c419bfb110754820327bdc0201b645ae5f771cee

  • SSDEEP

    49152:ffl4k5yBxWyX1b6zcZZXP5OUPO8oRyA3EX2BfJSV36eoK6KjvIMJB7QGJabsGcex:KX1b6zcZZXP5OUPO8oRyA3EX2BfJSV3K

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14c0c41d29fcbbc54629a01d2a1bc22f86d8446ab1896eef5acb495a8949acbd.exe
    "C:\Users\Admin\AppData\Local\Temp\14c0c41d29fcbbc54629a01d2a1bc22f86d8446ab1896eef5acb495a8949acbd.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1152

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1152-55-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/1152-56-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/1152-57-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/1152-59-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/1152-61-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/1152-64-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/1152-66-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/1152-69-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/1152-73-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/1152-71-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/1152-76-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/1152-78-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/1152-81-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/1152-83-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/1152-86-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/1152-90-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/1152-88-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/1152-93-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/1152-97-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/1152-95-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/1152-100-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/1152-102-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/1152-104-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/1152-105-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB