Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    12-11-2023 10:34

General

  • Target

    a9b940ffc4f17d98e450bbbb821782ea.exe

  • Size

    525KB

  • MD5

    a9b940ffc4f17d98e450bbbb821782ea

  • SHA1

    87c70b8a300f84265178c164914e04e6076d6ab1

  • SHA256

    fbc7cfe8a0e5524cda68dc93c9ff0003bdfa0ca55207504e6493d4657a925d02

  • SHA512

    52b04a2fb6f294f8462d92dde7b532f27465654260842893b4ec4d498c2f12bc584f05ba1a7f0fcb5bafabebbe65e024efd270be7dc6cbcfe12c547e60a6cf53

  • SSDEEP

    12288:4NrhTLpMP+R+QDCfA832AtBYmz6af0F7Z1QVj7jL:4thTiP+ffCfB5Lf0F7Z1E7jL

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9b940ffc4f17d98e450bbbb821782ea.exe
    "C:\Users\Admin\AppData\Local\Temp\a9b940ffc4f17d98e450bbbb821782ea.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1964

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1964-0-0x0000000000400000-0x0000000000558000-memory.dmp

    Filesize

    1.3MB

  • memory/1964-1-0x0000000000400000-0x0000000000558000-memory.dmp

    Filesize

    1.3MB