Analysis

  • max time kernel
    181s
  • max time network
    189s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2023 13:22

General

  • Target

    37d4a46b9650502e56a37f4ed25b8819.exe

  • Size

    91KB

  • MD5

    37d4a46b9650502e56a37f4ed25b8819

  • SHA1

    fe0cf754be791fafc378acb0ff027d4f7818103b

  • SHA256

    a218f6af11025119186fe7bd91ab1282730885bb490fdd8b713f8b0d5adcfce1

  • SHA512

    68ec1794e05487a7b439bb31f3b630a9c6dcf7056656668192995b365615e32ce44aa33eeeab4943aad3f89f378c9752b027aefb21c208cde379f594a1739ae7

  • SSDEEP

    1536:uJ8wUqzSqxl1a7dJ8ijpX9J2ltMeXe/WShTeDSJ4dz2ibAEchLIC6ldRl7futMM3:QnUqzZi3XmtMeSWfOkzhBlCKz7mtMMMQ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\37d4a46b9650502e56a37f4ed25b8819.exe
    "C:\Users\Admin\AppData\Local\Temp\37d4a46b9650502e56a37f4ed25b8819.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4804

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4804-0-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/4804-3-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB