Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2023, 04:34

General

  • Target

    dc70f141c1ccc2dc688f1d37cfb6e3dde0338ae45589cae8affc9212954e5b92.exe

  • Size

    2.3MB

  • MD5

    cd03432621fdc8f87762b3b1b78201d3

  • SHA1

    96b2a7e47f0de3d558b5ebd8b1c6ea733616afb2

  • SHA256

    dc70f141c1ccc2dc688f1d37cfb6e3dde0338ae45589cae8affc9212954e5b92

  • SHA512

    505498d38c276ed0286702cbcf3090dfcfdb19132bd377387ef601ff20b59e25da08dda4ad0c5a09c864438f04937eb46e1a35ad699c938249284f2d90d1ea12

  • SSDEEP

    49152:I1gQMz00qBRCm5Np2L0RBL9ph+/HmdArVHO9OlZsnF:tnqBn/2L0R5hymdArVu9OlZM

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 25 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dc70f141c1ccc2dc688f1d37cfb6e3dde0338ae45589cae8affc9212954e5b92.exe
    "C:\Users\Admin\AppData\Local\Temp\dc70f141c1ccc2dc688f1d37cfb6e3dde0338ae45589cae8affc9212954e5b92.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2220

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2220-1-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2220-3-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2220-5-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2220-7-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2220-14-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2220-18-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2220-20-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2220-22-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2220-27-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2220-29-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2220-34-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2220-36-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2220-40-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2220-42-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2220-45-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2220-47-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2220-38-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2220-32-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2220-25-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2220-16-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2220-12-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2220-10-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2220-2-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2220-0-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2220-48-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB