Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    28/08/2023, 22:19

General

  • Target

    42c9891dd82105085f7a42259a24a35db8e103207b8fd473756956cc4635e221.exe

  • Size

    708KB

  • MD5

    807f0da7217e9776cfd672454396044b

  • SHA1

    ca2235770b1756aa36c6cdf97db3f201c18f1c81

  • SHA256

    42c9891dd82105085f7a42259a24a35db8e103207b8fd473756956cc4635e221

  • SHA512

    3bcc3c3a4063670c7a32ae8e514b2cdd2768dd82f75573db0d19ece2013ea22f19491a8b3a5cabb4eb52436147f34f2d5538db75404c3a88a504f2383a099b05

  • SSDEEP

    12288:r/gobBjr5XQKNrKoNliPXN+b1vHZLMW+ciO6:rICjr5gKNmouX4ZfpMZ/O6

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\42c9891dd82105085f7a42259a24a35db8e103207b8fd473756956cc4635e221.exe
    "C:\Users\Admin\AppData\Local\Temp\42c9891dd82105085f7a42259a24a35db8e103207b8fd473756956cc4635e221.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2600

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2600-0-0x0000000000250000-0x000000000025B000-memory.dmp

    Filesize

    44KB

  • memory/2600-1-0x0000000000250000-0x000000000025B000-memory.dmp

    Filesize

    44KB