Analysis

  • max time kernel
    121s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 23:38

General

  • Target

    10e471cd3a04c43c15d7f36d14a6315dd66874fb9cb5ca709241d1beee95cd23.exe

  • Size

    2.9MB

  • MD5

    872759714292d18654ba5d9c9c04649d

  • SHA1

    6f44cfa143aac0686dbe8b01ab4961c310b8ba6d

  • SHA256

    10e471cd3a04c43c15d7f36d14a6315dd66874fb9cb5ca709241d1beee95cd23

  • SHA512

    d60730c61a9788485e92bb2640b9d5710bc8a89c9dd49b3960c97d872cd29b4e8f5c08a555ab7f1faedcd01a929c0d585ab8fe6569b0d0043e53bf22143033b0

  • SSDEEP

    49152:QxyCNHdHuuj0uh0kTkSmPk3pja425w1hrsEoQEJAwAMYdEaHza8+/O+TFJjDCK8c:QxyCN9Ou/h0kTkSmPSpa40wnrsEozJAG

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10e471cd3a04c43c15d7f36d14a6315dd66874fb9cb5ca709241d1beee95cd23.exe
    "C:\Users\Admin\AppData\Local\Temp\10e471cd3a04c43c15d7f36d14a6315dd66874fb9cb5ca709241d1beee95cd23.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2372

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2372-0-0x0000000000400000-0x0000000000F3A000-memory.dmp

    Filesize

    11.2MB

  • memory/2372-1-0x0000000000400000-0x0000000000F3A000-memory.dmp

    Filesize

    11.2MB

  • memory/2372-9-0x0000000000400000-0x0000000000F3A000-memory.dmp

    Filesize

    11.2MB

  • memory/2372-11-0x0000000000400000-0x0000000000F3A000-memory.dmp

    Filesize

    11.2MB

  • memory/2372-12-0x0000000000400000-0x0000000000F3A000-memory.dmp

    Filesize

    11.2MB