Analysis

  • max time kernel
    158s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/10/2023, 14:27

General

  • Target

    9623a4710cb2591bcb087b7986463910584c003bb71ebee8edb7e2b4a13f7416.exe

  • Size

    6.7MB

  • MD5

    95b6d07b2f9960b92d39bfed70964160

  • SHA1

    4daf4e023c2766cd5d1a79add885b43c672e4a88

  • SHA256

    9623a4710cb2591bcb087b7986463910584c003bb71ebee8edb7e2b4a13f7416

  • SHA512

    8f6b3408697accae67f076559036f742291c255316c414a98d71946541e1e9cd6aa514849ea023de69a7657843b1e3806c884c6fb23c8ddcb48278351145b381

  • SSDEEP

    98304:lKwQHuaJIWLcG0uttOHEhJxzLtipGMfv2rq3aX38NA03VeESWvw77lijHJAx5SpJ:6zHL91/qqH8R31pjHugV0E

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 25 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9623a4710cb2591bcb087b7986463910584c003bb71ebee8edb7e2b4a13f7416.exe
    "C:\Users\Admin\AppData\Local\Temp\9623a4710cb2591bcb087b7986463910584c003bb71ebee8edb7e2b4a13f7416.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4052

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4052-1-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/4052-0-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/4052-2-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/4052-3-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/4052-5-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/4052-7-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/4052-9-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/4052-11-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/4052-13-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/4052-15-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/4052-17-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/4052-19-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/4052-21-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/4052-23-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/4052-25-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/4052-27-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/4052-29-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/4052-31-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/4052-33-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/4052-35-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/4052-37-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/4052-39-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/4052-41-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/4052-43-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/4052-44-0x0000000002D80000-0x0000000002EF8000-memory.dmp

    Filesize

    1.5MB

  • memory/4052-51-0x0000000002D80000-0x0000000002EF8000-memory.dmp

    Filesize

    1.5MB

  • memory/4052-52-0x0000000002D80000-0x0000000002EF8000-memory.dmp

    Filesize

    1.5MB

  • memory/4052-61-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB