Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 03:38

General

  • Target

    51089e9f17ad556f2e4a815920b5eca9.exe

  • Size

    81KB

  • MD5

    51089e9f17ad556f2e4a815920b5eca9

  • SHA1

    4e055d9e11156f373dc3016141f7b014cd61f739

  • SHA256

    cf29d6d4066747a705b1eaadd524de045e82a7c441553675b5b2a1f19be1f5a8

  • SHA512

    f236c8a1b9b4f77d2de806249723e98290fa9c6415f11eea32b8445d16d028d8a464ab0736ca9bd17622594e004924402b8531117b270890265e0adc72ec25cf

  • SSDEEP

    1536:lOwhFrcGNowVbzvweKKN9PpJtfMj3yujeg/vBBxaFFKPvnVhlp0oqx7iZY1uHS+Z:lOsFgErRvlKK9MjVn/pGFFeVuoqAY1ur

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\51089e9f17ad556f2e4a815920b5eca9.exe
    "C:\Users\Admin\AppData\Local\Temp\51089e9f17ad556f2e4a815920b5eca9.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    PID:464

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Desktop\cartoons.url

    Filesize

    274B

    MD5

    ac556b28682f91f9cbbc864bc79739d5

    SHA1

    f771c0f9822fe90673d06f6242ccb81032a5aebd

    SHA256

    fecb32b1edabb2c8dbfa1f929007eba9c938a101f06bf959721b819bb9de10af

    SHA512

    bca91066508ad3f73b0f63f749e58ca97e61ac5ca7fecda4b2b0c0bbbf6f732eb10d7a6fe2b3ae6a414a46793b19943de9242f2ee811d7b394e221c14f2c71ed

  • memory/464-0-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/464-28-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB