Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230824-en
  • resource tags

    arch:x64arch:x86image:win7-20230824-enlocale:en-usos:windows7-x64system
  • submitted
    24-08-2023 21:06

General

  • Target

    d1eec5c2f87fc3a0234019001e88515f344bffe23b2ff5a9a460e10339bd6315.exe

  • Size

    2.4MB

  • MD5

    1681997b2a6f710fd63b7280d02f3f25

  • SHA1

    6b8334a728fdc91b5836ad9a203f575a8368df5b

  • SHA256

    d1eec5c2f87fc3a0234019001e88515f344bffe23b2ff5a9a460e10339bd6315

  • SHA512

    5ca8b5fadb086c2f639e84365e29dbe0d681eb4b5285c54b2ebd73f3d8515d73f8282c483d27e15181d28bfc618034b1d19b3e226e0632162ea35be81eb15961

  • SSDEEP

    49152:KjcbCOMbMgHxJZbEGnrTt36pwOLzC+fUSogsEJIWLpxdd:NMrZbEGrxaJIWLj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 27 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1eec5c2f87fc3a0234019001e88515f344bffe23b2ff5a9a460e10339bd6315.exe
    "C:\Users\Admin\AppData\Local\Temp\d1eec5c2f87fc3a0234019001e88515f344bffe23b2ff5a9a460e10339bd6315.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1076

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1076-0-0x0000000010000000-0x0000000010178000-memory.dmp

    Filesize

    1.5MB

  • memory/1076-6-0x0000000000300000-0x000000000033E000-memory.dmp

    Filesize

    248KB

  • memory/1076-8-0x0000000000300000-0x000000000033E000-memory.dmp

    Filesize

    248KB

  • memory/1076-9-0x0000000000300000-0x000000000033E000-memory.dmp

    Filesize

    248KB

  • memory/1076-10-0x0000000000300000-0x000000000033E000-memory.dmp

    Filesize

    248KB

  • memory/1076-11-0x0000000000300000-0x000000000033E000-memory.dmp

    Filesize

    248KB

  • memory/1076-14-0x0000000000300000-0x000000000033E000-memory.dmp

    Filesize

    248KB

  • memory/1076-18-0x0000000000300000-0x000000000033E000-memory.dmp

    Filesize

    248KB

  • memory/1076-20-0x0000000000300000-0x000000000033E000-memory.dmp

    Filesize

    248KB

  • memory/1076-24-0x0000000000300000-0x000000000033E000-memory.dmp

    Filesize

    248KB

  • memory/1076-28-0x0000000000300000-0x000000000033E000-memory.dmp

    Filesize

    248KB

  • memory/1076-32-0x0000000000300000-0x000000000033E000-memory.dmp

    Filesize

    248KB

  • memory/1076-30-0x0000000000300000-0x000000000033E000-memory.dmp

    Filesize

    248KB

  • memory/1076-26-0x0000000000300000-0x000000000033E000-memory.dmp

    Filesize

    248KB

  • memory/1076-22-0x0000000000300000-0x000000000033E000-memory.dmp

    Filesize

    248KB

  • memory/1076-16-0x0000000000300000-0x000000000033E000-memory.dmp

    Filesize

    248KB

  • memory/1076-36-0x0000000000300000-0x000000000033E000-memory.dmp

    Filesize

    248KB

  • memory/1076-40-0x0000000000300000-0x000000000033E000-memory.dmp

    Filesize

    248KB

  • memory/1076-44-0x0000000000300000-0x000000000033E000-memory.dmp

    Filesize

    248KB

  • memory/1076-48-0x0000000000300000-0x000000000033E000-memory.dmp

    Filesize

    248KB

  • memory/1076-50-0x0000000000300000-0x000000000033E000-memory.dmp

    Filesize

    248KB

  • memory/1076-52-0x0000000000300000-0x000000000033E000-memory.dmp

    Filesize

    248KB

  • memory/1076-46-0x0000000000300000-0x000000000033E000-memory.dmp

    Filesize

    248KB

  • memory/1076-42-0x0000000000300000-0x000000000033E000-memory.dmp

    Filesize

    248KB

  • memory/1076-38-0x0000000000300000-0x000000000033E000-memory.dmp

    Filesize

    248KB

  • memory/1076-34-0x0000000000300000-0x000000000033E000-memory.dmp

    Filesize

    248KB

  • memory/1076-12-0x0000000000300000-0x000000000033E000-memory.dmp

    Filesize

    248KB

  • memory/1076-53-0x0000000000300000-0x000000000033E000-memory.dmp

    Filesize

    248KB