Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    18-11-2023 07:59

General

  • Target

    86043f3bdcc6a87942f085b84f14ddb2743a9cb8dceac772c76fb05440ffdf47.exe

  • Size

    8.6MB

  • MD5

    a718fe1922e7fcf18d32e97cca3599fa

  • SHA1

    38910262cc2bf2941aa820c8fe24815a0b9f719e

  • SHA256

    86043f3bdcc6a87942f085b84f14ddb2743a9cb8dceac772c76fb05440ffdf47

  • SHA512

    037feb08db62aed17f22b7c83ea91ea8f4d35da1c95bde62f59ada5e14f0b29b82e2c5cc1a13a4c23be7d1127c3f7bc97366f4869d5404b3ce980ae4cab5781a

  • SSDEEP

    196608:exLiz4n89RlsvT5VOg9FMFd+dRlsvT50O:eE4n89RopDdRo0O

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 20 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\86043f3bdcc6a87942f085b84f14ddb2743a9cb8dceac772c76fb05440ffdf47.exe
    "C:\Users\Admin\AppData\Local\Temp\86043f3bdcc6a87942f085b84f14ddb2743a9cb8dceac772c76fb05440ffdf47.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2436

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2436-1-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2436-2-0x00000000001F0000-0x000000000020C000-memory.dmp

    Filesize

    112KB

  • memory/2436-3-0x00000000001F0000-0x000000000020C000-memory.dmp

    Filesize

    112KB

  • memory/2436-5-0x00000000001F0000-0x000000000020C000-memory.dmp

    Filesize

    112KB

  • memory/2436-6-0x00000000001F0000-0x000000000020C000-memory.dmp

    Filesize

    112KB

  • memory/2436-4-0x00000000001F0000-0x000000000020C000-memory.dmp

    Filesize

    112KB

  • memory/2436-7-0x00000000001F0000-0x000000000020C000-memory.dmp

    Filesize

    112KB

  • memory/2436-8-0x00000000001F0000-0x000000000020C000-memory.dmp

    Filesize

    112KB

  • memory/2436-9-0x00000000001F0000-0x000000000020C000-memory.dmp

    Filesize

    112KB

  • memory/2436-11-0x00000000001F0000-0x000000000020C000-memory.dmp

    Filesize

    112KB

  • memory/2436-10-0x00000000001F0000-0x000000000020C000-memory.dmp

    Filesize

    112KB

  • memory/2436-12-0x00000000001F0000-0x000000000020C000-memory.dmp

    Filesize

    112KB

  • memory/2436-13-0x00000000001F0000-0x000000000020C000-memory.dmp

    Filesize

    112KB

  • memory/2436-14-0x00000000001F0000-0x000000000020C000-memory.dmp

    Filesize

    112KB

  • memory/2436-15-0x00000000001F0000-0x000000000020C000-memory.dmp

    Filesize

    112KB

  • memory/2436-16-0x00000000001F0000-0x000000000020C000-memory.dmp

    Filesize

    112KB

  • memory/2436-17-0x00000000001F0000-0x000000000020C000-memory.dmp

    Filesize

    112KB

  • memory/2436-18-0x00000000001F0000-0x000000000020C000-memory.dmp

    Filesize

    112KB

  • memory/2436-19-0x00000000001F0000-0x000000000020C000-memory.dmp

    Filesize

    112KB

  • memory/2436-20-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB