Analysis

  • max time kernel
    0s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 12:32

General

  • Target

    6ec5c8b962988bf84bd203b2cbf24734.exe

  • Size

    4.2MB

  • MD5

    6ec5c8b962988bf84bd203b2cbf24734

  • SHA1

    ae064ca42656effaea911f1dd4da94b50aa7bc83

  • SHA256

    b6d48666713c07eb391d9165720303f2d3904df3845b9cbf08f0f7a434953cd4

  • SHA512

    fc42a28afa94b3ebc19c403533fd285f1d406775aeabbf0564bb3e0449e8e141e313e23ec5c1eeac1bd0435342e4706ba667f4727644872db8c7adb64bdb922e

  • SSDEEP

    98304:KEB5hYqGIOzAIfW4rya7+/zqitNiN09x90NVFNI9+625G5XxKlf1:dJErWzLNeIx9MFNIs625G5XCf1

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ec5c8b962988bf84bd203b2cbf24734.exe
    "C:\Users\Admin\AppData\Local\Temp\6ec5c8b962988bf84bd203b2cbf24734.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2292-1-0x0000000000230000-0x0000000000237000-memory.dmp

    Filesize

    28KB

  • memory/2292-0-0x0000000000400000-0x0000000000564000-memory.dmp

    Filesize

    1.4MB

  • memory/2292-6-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2292-2-0x0000000000400000-0x0000000000564000-memory.dmp

    Filesize

    1.4MB

  • memory/2292-18-0x0000000003E90000-0x0000000003EEB000-memory.dmp

    Filesize

    364KB

  • memory/2292-73-0x0000000000400000-0x0000000000564000-memory.dmp

    Filesize

    1.4MB

  • memory/2292-75-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2292-76-0x0000000003E90000-0x0000000003EEB000-memory.dmp

    Filesize

    364KB