Analysis

  • max time kernel
    143s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-08-2023 04:31

General

  • Target

    e4a28407ab26e8827fd5c733b51d9e50ab7ab88aff1fa2ed2e744d2598e65adf.exe

  • Size

    2.1MB

  • MD5

    efb01c72da216952ae801344a302e00c

  • SHA1

    f8eefd8043bca7d7c423b169cfc2eb8f18789c9f

  • SHA256

    e4a28407ab26e8827fd5c733b51d9e50ab7ab88aff1fa2ed2e744d2598e65adf

  • SHA512

    cc2754bb07963f36c381468aee7590d763be2ab4d1108e0607336541600022d40ea34dad7a4eab5534d6149a4653deaa00ef7b84a3a6a75c62a940a83753b2c7

  • SSDEEP

    24576:Lkl8ioex30gSZfUfcXzMb7x5RNn2k0NnI3j74PdnUYEbqplKYtl+dLw40Q5eUgBE:LfZNqfnTf2kz3jA6p2pL+0Qw9rj+d

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 25 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4a28407ab26e8827fd5c733b51d9e50ab7ab88aff1fa2ed2e744d2598e65adf.exe
    "C:\Users\Admin\AppData\Local\Temp\e4a28407ab26e8827fd5c733b51d9e50ab7ab88aff1fa2ed2e744d2598e65adf.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:3696

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3696-0-0x0000000010000000-0x000000001003C000-memory.dmp

    Filesize

    240KB

  • memory/3696-7-0x0000000000D50000-0x0000000000D8E000-memory.dmp

    Filesize

    248KB

  • memory/3696-8-0x0000000000D50000-0x0000000000D8E000-memory.dmp

    Filesize

    248KB

  • memory/3696-9-0x0000000000D50000-0x0000000000D8E000-memory.dmp

    Filesize

    248KB

  • memory/3696-10-0x0000000000D50000-0x0000000000D8E000-memory.dmp

    Filesize

    248KB

  • memory/3696-12-0x0000000000D50000-0x0000000000D8E000-memory.dmp

    Filesize

    248KB

  • memory/3696-14-0x0000000000D50000-0x0000000000D8E000-memory.dmp

    Filesize

    248KB

  • memory/3696-16-0x0000000000D50000-0x0000000000D8E000-memory.dmp

    Filesize

    248KB

  • memory/3696-18-0x0000000000D50000-0x0000000000D8E000-memory.dmp

    Filesize

    248KB

  • memory/3696-20-0x0000000000D50000-0x0000000000D8E000-memory.dmp

    Filesize

    248KB

  • memory/3696-22-0x0000000000D50000-0x0000000000D8E000-memory.dmp

    Filesize

    248KB

  • memory/3696-24-0x0000000000D50000-0x0000000000D8E000-memory.dmp

    Filesize

    248KB

  • memory/3696-26-0x0000000000D50000-0x0000000000D8E000-memory.dmp

    Filesize

    248KB

  • memory/3696-28-0x0000000010000000-0x000000001003C000-memory.dmp

    Filesize

    240KB

  • memory/3696-30-0x0000000000D50000-0x0000000000D8E000-memory.dmp

    Filesize

    248KB

  • memory/3696-32-0x0000000000D50000-0x0000000000D8E000-memory.dmp

    Filesize

    248KB

  • memory/3696-34-0x0000000000D50000-0x0000000000D8E000-memory.dmp

    Filesize

    248KB

  • memory/3696-36-0x0000000000D50000-0x0000000000D8E000-memory.dmp

    Filesize

    248KB

  • memory/3696-38-0x0000000000D50000-0x0000000000D8E000-memory.dmp

    Filesize

    248KB

  • memory/3696-40-0x0000000000D50000-0x0000000000D8E000-memory.dmp

    Filesize

    248KB

  • memory/3696-42-0x0000000000D50000-0x0000000000D8E000-memory.dmp

    Filesize

    248KB

  • memory/3696-44-0x0000000000D50000-0x0000000000D8E000-memory.dmp

    Filesize

    248KB

  • memory/3696-46-0x0000000000D50000-0x0000000000D8E000-memory.dmp

    Filesize

    248KB

  • memory/3696-48-0x0000000000D50000-0x0000000000D8E000-memory.dmp

    Filesize

    248KB

  • memory/3696-50-0x0000000000D50000-0x0000000000D8E000-memory.dmp

    Filesize

    248KB

  • memory/3696-52-0x0000000000D50000-0x0000000000D8E000-memory.dmp

    Filesize

    248KB

  • memory/3696-55-0x0000000000D50000-0x0000000000D8E000-memory.dmp

    Filesize

    248KB