Analysis

  • max time kernel
    141s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 17:44

General

  • Target

    FuriousSP/FuRiousSP.exe

  • Size

    37KB

  • MD5

    1835ac3b7310ca4090542dce8eddb10c

  • SHA1

    ef5a945d74d6a2b0f9bdef44d5da3df147313377

  • SHA256

    90834584965e43325b6382b474486391609b541acffc155ee728e08a28c08c32

  • SHA512

    e27b34cccc5b3d18072a045b4f554204dfc365cdf434b1b5f73c8fa1db1f3387784c7b7450c7bce676825862adfe562cc9d4cf0e3af11031c0393eb54736ef6a

  • SSDEEP

    768:Cdcv1DS4b7ZXEb1fr2eRNAEptRUiYzTWmhEuUxqANl+a:CdMh37SFrdhptR4zTWmGu4qANj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 20 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FuriousSP\FuRiousSP.exe
    "C:\Users\Admin\AppData\Local\Temp\FuriousSP\FuRiousSP.exe"
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2200

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2200-0-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2200-1-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2200-2-0x0000000003E70000-0x0000000003E71000-memory.dmp

    Filesize

    4KB

  • memory/2200-3-0x0000000004440000-0x0000000004442000-memory.dmp

    Filesize

    8KB

  • memory/2200-4-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2200-6-0x0000000003E70000-0x0000000003E71000-memory.dmp

    Filesize

    4KB