Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    09-10-2023 02:57

General

  • Target

    563258c5ecf4726d4dbee5639185bad669fe5bc72d7aa48c65700247da293362.exe

  • Size

    3.1MB

  • MD5

    b5216ae670929575ef39b6432122c458

  • SHA1

    f1235ee2efe9161244a23f188f36708870c9cd57

  • SHA256

    563258c5ecf4726d4dbee5639185bad669fe5bc72d7aa48c65700247da293362

  • SHA512

    0c25cb8899f921e8c5b90b0c37ff7fa84070613937c19714b6d811cfca9a89d008338836b57791652f18b7c6630c08b292713a6ed2a14138f85ace656a6541ba

  • SSDEEP

    98304:G58inUP1UkrJv3p27q65nw0U7tE+27phIiliA:6UP1UQvMqe0ZZaR

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 27 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\563258c5ecf4726d4dbee5639185bad669fe5bc72d7aa48c65700247da293362.exe
    "C:\Users\Admin\AppData\Local\Temp\563258c5ecf4726d4dbee5639185bad669fe5bc72d7aa48c65700247da293362.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2976

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2976-0-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2976-4-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2976-5-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2976-3-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2976-2-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2976-6-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2976-8-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2976-11-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2976-13-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2976-16-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2976-18-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2976-20-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2976-23-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2976-25-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2976-28-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2976-30-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2976-33-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2976-35-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2976-38-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2976-40-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2976-42-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2976-46-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2976-44-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2976-48-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2976-50-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2976-52-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2976-53-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB