Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/09/2023, 22:20

General

  • Target

    a5f842e68405c826393c841ff1dfef1e63dca81fc42b6d4a018f37e1a81b7fc0.exe

  • Size

    1.5MB

  • MD5

    4f556c983a5c1ffa18dbe841249b05d1

  • SHA1

    f4a01b1d7885b122c580b9e9797148c85a9ccff4

  • SHA256

    a5f842e68405c826393c841ff1dfef1e63dca81fc42b6d4a018f37e1a81b7fc0

  • SHA512

    5f93ce842506fd44c4e91cf35fbeb4b81ddc698c435218b95c8bcfefaaa91f37fae71033eb740d2d6c65a59e2b06fbac5a43545821f0dda8137a007e0235e676

  • SSDEEP

    24576:iniqXTRw0AjvX6wA74XURZxQZhXEDH2IQiBmP0QBhDxTqsnA8TWNGV0cWB7Y8Fa:in/lwdU3xuheWw419xTqrXNZjBva

Score
7/10
upx

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • UPX packed file 13 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5f842e68405c826393c841ff1dfef1e63dca81fc42b6d4a018f37e1a81b7fc0.exe
    "C:\Users\Admin\AppData\Local\Temp\a5f842e68405c826393c841ff1dfef1e63dca81fc42b6d4a018f37e1a81b7fc0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:3368

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\iext1.fnr.bbs.125.la

          Filesize

          724KB

          MD5

          a96fbd5e66b31f3d816ad80f623e9bd9

          SHA1

          4eda42260bd3eb930cd4eafd7d15c6af367bcf18

          SHA256

          2e67ba278646fde95bb614dcbcc7da1c6bf7976c918b2c6ad3d78640000326f3

          SHA512

          43921107313775ea14b1bd33cf758c13798f4fa1c1074771c1c96b1b43b98f3416d249ed8ab3171383772d0054829c3754a91b5e94135f1df6d67a76f599c80e

        • memory/3368-19-0x0000000000400000-0x00000000009E4200-memory.dmp

          Filesize

          5.9MB

        • memory/3368-7-0x00000000039A0000-0x0000000003A12000-memory.dmp

          Filesize

          456KB

        • memory/3368-12-0x0000000000400000-0x00000000009E4200-memory.dmp

          Filesize

          5.9MB

        • memory/3368-13-0x0000000000400000-0x00000000009E4200-memory.dmp

          Filesize

          5.9MB

        • memory/3368-14-0x0000000002C60000-0x0000000002C61000-memory.dmp

          Filesize

          4KB

        • memory/3368-15-0x0000000005970000-0x0000000005971000-memory.dmp

          Filesize

          4KB

        • memory/3368-17-0x0000000005890000-0x0000000005891000-memory.dmp

          Filesize

          4KB

        • memory/3368-16-0x0000000000400000-0x00000000009E4200-memory.dmp

          Filesize

          5.9MB

        • memory/3368-0-0x0000000000400000-0x00000000009E4200-memory.dmp

          Filesize

          5.9MB

        • memory/3368-18-0x0000000000400000-0x00000000009E4200-memory.dmp

          Filesize

          5.9MB

        • memory/3368-20-0x000000000B6D0000-0x000000000B6D1000-memory.dmp

          Filesize

          4KB

        • memory/3368-22-0x000000000B7C0000-0x000000000B7C1000-memory.dmp

          Filesize

          4KB

        • memory/3368-21-0x000000000B770000-0x000000000B771000-memory.dmp

          Filesize

          4KB

        • memory/3368-23-0x0000000000400000-0x00000000009E4200-memory.dmp

          Filesize

          5.9MB

        • memory/3368-24-0x0000000000400000-0x00000000009E4200-memory.dmp

          Filesize

          5.9MB

        • memory/3368-25-0x00000000039A0000-0x0000000003A12000-memory.dmp

          Filesize

          456KB

        • memory/3368-26-0x00000000059E0000-0x00000000059E1000-memory.dmp

          Filesize

          4KB

        • memory/3368-34-0x0000000000400000-0x00000000009E4200-memory.dmp

          Filesize

          5.9MB

        • memory/3368-36-0x0000000000400000-0x00000000009E4200-memory.dmp

          Filesize

          5.9MB

        • memory/3368-37-0x0000000000400000-0x00000000009E4200-memory.dmp

          Filesize

          5.9MB