Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/10/2023, 07:50

General

  • Target

    e7d203b6b61218784b9e08296779124028fd0a48e5d6cc1a27e01e018cb7b014.exe

  • Size

    2.2MB

  • MD5

    7216242f4e6adc9b04d52c5f0d64237a

  • SHA1

    2fd1846f02382ef53740bd8463b65f284afcbcd6

  • SHA256

    e7d203b6b61218784b9e08296779124028fd0a48e5d6cc1a27e01e018cb7b014

  • SHA512

    d37b321b7baaf73c58a8f5c0e1bf4e5d20658fde1707a3ff2538907ab7723c8172ed1ee80b794aa7d50fca20baffe553af98509af554548b87061eb8bece971f

  • SSDEEP

    49152:C3ikVRfPuSfCyY+RxL9CvSimjQs2q6ZAEne3TExc:qz08BCvSivy26TE

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7d203b6b61218784b9e08296779124028fd0a48e5d6cc1a27e01e018cb7b014.exe
    "C:\Users\Admin\AppData\Local\Temp\e7d203b6b61218784b9e08296779124028fd0a48e5d6cc1a27e01e018cb7b014.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1928

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1928-0-0x0000000000400000-0x0000000000BE7000-memory.dmp

    Filesize

    7.9MB

  • memory/1928-1-0x0000000000400000-0x0000000000BE7000-memory.dmp

    Filesize

    7.9MB

  • memory/1928-4-0x0000000000400000-0x0000000000BE7000-memory.dmp

    Filesize

    7.9MB

  • memory/1928-5-0x0000000000400000-0x0000000000BE7000-memory.dmp

    Filesize

    7.9MB

  • memory/1928-6-0x0000000000400000-0x0000000000BE7000-memory.dmp

    Filesize

    7.9MB

  • memory/1928-7-0x0000000000400000-0x0000000000BE7000-memory.dmp

    Filesize

    7.9MB

  • memory/1928-8-0x0000000000400000-0x0000000000BE7000-memory.dmp

    Filesize

    7.9MB

  • memory/1928-9-0x0000000000400000-0x0000000000BE7000-memory.dmp

    Filesize

    7.9MB

  • memory/1928-10-0x0000000000400000-0x0000000000BE7000-memory.dmp

    Filesize

    7.9MB

  • memory/1928-11-0x0000000000400000-0x0000000000BE7000-memory.dmp

    Filesize

    7.9MB

  • memory/1928-12-0x0000000000400000-0x0000000000BE7000-memory.dmp

    Filesize

    7.9MB

  • memory/1928-13-0x0000000000400000-0x0000000000BE7000-memory.dmp

    Filesize

    7.9MB

  • memory/1928-14-0x0000000000400000-0x0000000000BE7000-memory.dmp

    Filesize

    7.9MB

  • memory/1928-15-0x0000000000400000-0x0000000000BE7000-memory.dmp

    Filesize

    7.9MB