Analysis

  • max time kernel
    142s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2023, 21:59

General

  • Target

    b268998f8f9562ad91f403430c7b9259cce35ca442985fbc0b847ae09b9d09ac.exe

  • Size

    3.6MB

  • MD5

    37a5a4b37921cb8d19ab436385844fe0

  • SHA1

    9a55dac1671fdc579ad695241d6a7db6a8662a86

  • SHA256

    b268998f8f9562ad91f403430c7b9259cce35ca442985fbc0b847ae09b9d09ac

  • SHA512

    b97ca47bbe0dc0af5e6e26801f953d349a82153290956a14610abd003ce4e0df3f3a1ce8ce2ff2812ca8088489fb9bc56297a0bc66c8227611198e5a30f21fa3

  • SSDEEP

    98304:tmxZJW4P3zYkTC0rDaBTNTeQCf93JuorLGzNFQ4ykfkQqmF:tkZJW45zoCl3corCzQ4JqmF

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 15 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b268998f8f9562ad91f403430c7b9259cce35ca442985fbc0b847ae09b9d09ac.exe
    "C:\Users\Admin\AppData\Local\Temp\b268998f8f9562ad91f403430c7b9259cce35ca442985fbc0b847ae09b9d09ac.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    PID:2472

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2472-0-0x0000000000400000-0x0000000000C14000-memory.dmp

          Filesize

          8.1MB

        • memory/2472-2-0x0000000000400000-0x0000000000C14000-memory.dmp

          Filesize

          8.1MB

        • memory/2472-3-0x0000000000400000-0x0000000000C14000-memory.dmp

          Filesize

          8.1MB

        • memory/2472-4-0x0000000000400000-0x0000000000C14000-memory.dmp

          Filesize

          8.1MB

        • memory/2472-5-0x0000000000400000-0x0000000000C14000-memory.dmp

          Filesize

          8.1MB

        • memory/2472-6-0x0000000000400000-0x0000000000C14000-memory.dmp

          Filesize

          8.1MB

        • memory/2472-7-0x0000000000400000-0x0000000000C14000-memory.dmp

          Filesize

          8.1MB

        • memory/2472-8-0x0000000000400000-0x0000000000C14000-memory.dmp

          Filesize

          8.1MB

        • memory/2472-9-0x0000000000400000-0x0000000000C14000-memory.dmp

          Filesize

          8.1MB

        • memory/2472-10-0x0000000000400000-0x0000000000C14000-memory.dmp

          Filesize

          8.1MB

        • memory/2472-11-0x0000000000400000-0x0000000000C14000-memory.dmp

          Filesize

          8.1MB

        • memory/2472-12-0x0000000000400000-0x0000000000C14000-memory.dmp

          Filesize

          8.1MB

        • memory/2472-13-0x0000000000400000-0x0000000000C14000-memory.dmp

          Filesize

          8.1MB

        • memory/2472-14-0x0000000000400000-0x0000000000C14000-memory.dmp

          Filesize

          8.1MB

        • memory/2472-15-0x0000000000400000-0x0000000000C14000-memory.dmp

          Filesize

          8.1MB