Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 00:39

General

  • Target

    4704a7b35558d3e67a71d6fe40fbd2f7.exe

  • Size

    355KB

  • MD5

    4704a7b35558d3e67a71d6fe40fbd2f7

  • SHA1

    1a9f3f59653c0aea17bb478fed6d3c54ecede8c0

  • SHA256

    5c836920cb59d8e1f7e2a0966e899684976c88a1e01856a156d19ca76aaafc76

  • SHA512

    a2fea9d2d07b1a90f7bd5bafe6a0329385539dda4b8c292052e33c0a9e508bae6a08845cf73cb3902a7232943a893365c0523b89fe047acf77b7d97cb27c191e

  • SSDEEP

    6144:EQg6R6F9j4z7WHf09RbMOs02+NfOV9ddrFm6UvjaEo+8NfWxU561nqSZK3LR:Jg6ZzS89qODdG9ddrILrCfWxwj3LR

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4704a7b35558d3e67a71d6fe40fbd2f7.exe
    "C:\Users\Admin\AppData\Local\Temp\4704a7b35558d3e67a71d6fe40fbd2f7.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1340

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1340-0-0x0000000000400000-0x00000000004DB000-memory.dmp

          Filesize

          876KB

        • memory/1340-1-0x0000000000C80000-0x0000000000C81000-memory.dmp

          Filesize

          4KB

        • memory/1340-2-0x0000000000400000-0x00000000004DB000-memory.dmp

          Filesize

          876KB

        • memory/1340-4-0x0000000000C80000-0x0000000000C81000-memory.dmp

          Filesize

          4KB