Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-10-2023 02:47

General

  • Target

    9f03ee48fe139aa1657b38abad34fb206b499c6f293c0b2458ba15544d3d0d5d.exe

  • Size

    1.3MB

  • MD5

    f544f8cfbcba7e218c000a43860e784e

  • SHA1

    dc7a77ba2d3222374b5ea3e496b400944c6144de

  • SHA256

    9f03ee48fe139aa1657b38abad34fb206b499c6f293c0b2458ba15544d3d0d5d

  • SHA512

    66fdb914d260bb8a6ed4fb3ec115015449c6b403760161fa54bd580d889c2fd4a7d6597b262aae29c99b3b1a10a7d91bb9a1c8b31c99e1ab2e6c246e83a6a3fb

  • SSDEEP

    24576:3AsuMKRREZbwfXxjDymotvu9t4ssA4MahS0VXzAK1JaUdx/j1WCZq7Jqbj:3AsuhzECdJI355aqnE9q

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 15 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f03ee48fe139aa1657b38abad34fb206b499c6f293c0b2458ba15544d3d0d5d.exe
    "C:\Users\Admin\AppData\Local\Temp\9f03ee48fe139aa1657b38abad34fb206b499c6f293c0b2458ba15544d3d0d5d.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:3556

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3556-0-0x0000000000400000-0x0000000000A8D000-memory.dmp

    Filesize

    6.6MB

  • memory/3556-2-0x0000000000400000-0x0000000000A8D000-memory.dmp

    Filesize

    6.6MB

  • memory/3556-3-0x0000000000400000-0x0000000000A8D000-memory.dmp

    Filesize

    6.6MB

  • memory/3556-4-0x0000000000400000-0x0000000000A8D000-memory.dmp

    Filesize

    6.6MB

  • memory/3556-5-0x0000000000400000-0x0000000000A8D000-memory.dmp

    Filesize

    6.6MB

  • memory/3556-6-0x0000000000400000-0x0000000000A8D000-memory.dmp

    Filesize

    6.6MB

  • memory/3556-7-0x0000000000400000-0x0000000000A8D000-memory.dmp

    Filesize

    6.6MB

  • memory/3556-8-0x0000000000400000-0x0000000000A8D000-memory.dmp

    Filesize

    6.6MB

  • memory/3556-9-0x0000000000400000-0x0000000000A8D000-memory.dmp

    Filesize

    6.6MB

  • memory/3556-10-0x0000000000400000-0x0000000000A8D000-memory.dmp

    Filesize

    6.6MB

  • memory/3556-11-0x0000000000400000-0x0000000000A8D000-memory.dmp

    Filesize

    6.6MB

  • memory/3556-12-0x0000000000400000-0x0000000000A8D000-memory.dmp

    Filesize

    6.6MB

  • memory/3556-13-0x0000000000400000-0x0000000000A8D000-memory.dmp

    Filesize

    6.6MB

  • memory/3556-14-0x0000000000400000-0x0000000000A8D000-memory.dmp

    Filesize

    6.6MB

  • memory/3556-15-0x0000000000400000-0x0000000000A8D000-memory.dmp

    Filesize

    6.6MB