Analysis

  • max time kernel
    153s
  • max time network
    178s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2023 08:13

General

  • Target

    d9b37563fb49d9d74fb89b1c14dd35480054ec6e86c72c7582560a026890817b.exe

  • Size

    3.9MB

  • MD5

    7468144cd79e3e8b2523c6bc961c41ec

  • SHA1

    f672f49081e94ad66aae3176d2137599c287a622

  • SHA256

    d9b37563fb49d9d74fb89b1c14dd35480054ec6e86c72c7582560a026890817b

  • SHA512

    583d8e1f1839189b1d85dce9c80314f0061a37470bae88b3ac582443e2998ae621cd5df7ff483ed7849c552676a8f9567395d6cf8301fb224235ccc6204d5aa5

  • SSDEEP

    49152:AHPVlvC7NXhb4N/P8VioBDx1nq+s8KuqGaX0ToIBAUZLYbEn3+s8KuqGaX0ToIBR:QdhC7NxMFOioBVZ5JBAUZLWJBAUZLUDS

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 26 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9b37563fb49d9d74fb89b1c14dd35480054ec6e86c72c7582560a026890817b.exe
    "C:\Users\Admin\AppData\Local\Temp\d9b37563fb49d9d74fb89b1c14dd35480054ec6e86c72c7582560a026890817b.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1772

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1772-0-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1772-2-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1772-3-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1772-4-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1772-5-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1772-7-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1772-9-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1772-11-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1772-13-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1772-15-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1772-17-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1772-19-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1772-21-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1772-23-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1772-25-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1772-27-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1772-29-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1772-31-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1772-33-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1772-35-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1772-37-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1772-39-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1772-41-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1772-44-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1772-46-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1772-47-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB