Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    07/10/2023, 20:34

General

  • Target

    190ced6dfada8283af6e052b0bbd0b8988996ba59646ac5c1b5f7003fa174ef2.exe

  • Size

    558KB

  • MD5

    5ab975bb71e48bcf3c73424167adf3fb

  • SHA1

    99e4d9d7fac285a225b772b57c2b5b4f91edbea3

  • SHA256

    190ced6dfada8283af6e052b0bbd0b8988996ba59646ac5c1b5f7003fa174ef2

  • SHA512

    592f339834b4dd4f0c38af5603e2dbafcf93e0ddd244e58a9c9d60d59a02cbafab16c751eb65e1466136791f48cd7ff99723495f7f69f1f5fad95dd759ef219c

  • SSDEEP

    12288:GcQbx3pBocfwL8TpEbezdll5+k9EnChg+fmP13JjUWw0PfGBkR:Gnb1ocfRBz/TRW+63w0XJ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\190ced6dfada8283af6e052b0bbd0b8988996ba59646ac5c1b5f7003fa174ef2.exe
    "C:\Users\Admin\AppData\Local\Temp\190ced6dfada8283af6e052b0bbd0b8988996ba59646ac5c1b5f7003fa174ef2.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:368

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/368-0-0x0000000000400000-0x0000000000571000-memory.dmp

    Filesize

    1.4MB

  • memory/368-1-0x0000000000400000-0x0000000000571000-memory.dmp

    Filesize

    1.4MB