Analysis

  • max time kernel
    142s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2023 02:14

General

  • Target

    242715a0c26937bd247db8a19e8a002c.exe

  • Size

    358KB

  • MD5

    242715a0c26937bd247db8a19e8a002c

  • SHA1

    946a248201f1c350db979ed46c06af6f7b191a0b

  • SHA256

    222df715f1f1f759db04067dc0ba0069de0beb8ef0e8f53f4a0fbb4b5c01e93a

  • SHA512

    b05f56285872add95c407e6dc9054649d55a8691270259a4c50c1cbfb7ba538d6105c4c334eb2b5849ed3e26c48926d198c1700bec52e1e3bfaaf269ac1707da

  • SSDEEP

    6144:Gl8KWs/bWq+nR6xtEstSlckJ4OUSccLU4968TI+RjoS0:Gl837cCHJrccvZPRjoS0

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\242715a0c26937bd247db8a19e8a002c.exe
    "C:\Users\Admin\AppData\Local\Temp\242715a0c26937bd247db8a19e8a002c.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\GetRightToGo\242715a0c26937bd247db8a19e8a002c.data0

    Filesize

    1KB

    MD5

    d487c33bbbd6a2601fb82059e5581e16

    SHA1

    c337345173e391cf9f15760bb61da80bb839d986

    SHA256

    dbe271994a35a565fb4fc9f6b7c75c61efe03f7b03dd54b05170b4fdd4f0a7a1

    SHA512

    47182a2435138d204e8fc36a784eae3510f70c060e0a03b72773a7a95110f0c6dea7620e1a4527e708f685aef60d1e244eef74fb9157a3a541268086d8526e3d

  • memory/2488-0-0x0000000000400000-0x000000000050C000-memory.dmp

    Filesize

    1.0MB

  • memory/2488-12-0x0000000000400000-0x000000000050C000-memory.dmp

    Filesize

    1.0MB