Analysis

  • max time kernel
    0s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2023 04:42

General

  • Target

    5517496138377a5b0f26c71ca83991b6.exe

  • Size

    1.1MB

  • MD5

    5517496138377a5b0f26c71ca83991b6

  • SHA1

    1f70798bd7995bea4d53c5b3ab29a8d5ac93f640

  • SHA256

    1074de6e1189dd9fb34a114f2178eac83ae8bf5d3cfc3c914d7a9695265477e9

  • SHA512

    0d4e0e05edb4d20542a5a20da915f15e745a59ee551c9d59c4a51c3f079a39b22edf5eeb58b8c27c31d659970252087c1c0a246e30580845d1b1ccd15e3e1491

  • SSDEEP

    24576:B6PDA0uON4W1bxn3x9rgJqXeejyFMOmUn3:BYDA0uON4WJx3zrgJqOH6i

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5517496138377a5b0f26c71ca83991b6.exe
    "C:\Users\Admin\AppData\Local\Temp\5517496138377a5b0f26c71ca83991b6.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:3468

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3468-0-0x0000000000400000-0x0000000000780000-memory.dmp

    Filesize

    3.5MB

  • memory/3468-1-0x00000000027B0000-0x00000000027B1000-memory.dmp

    Filesize

    4KB

  • memory/3468-6-0x0000000000400000-0x0000000000780000-memory.dmp

    Filesize

    3.5MB

  • memory/3468-8-0x00000000027B0000-0x00000000027B1000-memory.dmp

    Filesize

    4KB