Analysis

  • max time kernel
    2s
  • max time network
    69s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/08/2023, 23:18

General

  • Target

    e2dcef2a98aed444db68109c6c757f785b7176f9c3069b1fee38c8efbbc5088e.exe

  • Size

    699KB

  • MD5

    fd402015eb839f983f85cdcb8a55f902

  • SHA1

    b652980af66171efd4c6a7abaecc6cc4a108bc39

  • SHA256

    e2dcef2a98aed444db68109c6c757f785b7176f9c3069b1fee38c8efbbc5088e

  • SHA512

    8f16351baa00e28cba8de8ccdbd779686cfcc358edd292413a7822e4b491a917f919bbe6aefa8e473decc35a167732bd8a10b391370f1c7c1e5b4fc3e273bdf6

  • SSDEEP

    12288:Op+yEpu7UjHi0yww00O+FHjPx3Qtc1efXclHXn728d4SAteBXeoZOTbjXfCtMoSD:lvu4j/ywwdB1Qy1wc17t4DtShZ6bratS

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 21 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2dcef2a98aed444db68109c6c757f785b7176f9c3069b1fee38c8efbbc5088e.exe
    "C:\Users\Admin\AppData\Local\Temp\e2dcef2a98aed444db68109c6c757f785b7176f9c3069b1fee38c8efbbc5088e.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3240

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3240-0-0x0000000000400000-0x00000000005C3000-memory.dmp

          Filesize

          1.8MB

        • memory/3240-1-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3240-3-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3240-4-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3240-7-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3240-5-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3240-6-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3240-9-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3240-11-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3240-13-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3240-15-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3240-17-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3240-19-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3240-21-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3240-23-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3240-25-0x0000000000400000-0x00000000005C3000-memory.dmp

          Filesize

          1.8MB

        • memory/3240-27-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3240-29-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3240-31-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3240-33-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/3240-35-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB