Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 14:26

General

  • Target

    2164a2718760a216917dd287196d7463bf62f8f7e834da3aa607adf712c8f2cb.exe

  • Size

    444KB

  • MD5

    3a8cd62f96a13692319ee55793b94163

  • SHA1

    51eca7a610ea6ffa32519362827c238ddbd1520d

  • SHA256

    2164a2718760a216917dd287196d7463bf62f8f7e834da3aa607adf712c8f2cb

  • SHA512

    24b80bcd39c151313207964fcfaab4af3a87ab5a0032ae3d2dc903e1c41ab0bd971bdccd3771277601e7bb36447608ba81f77af3480ec162e09301c7a4a68c38

  • SSDEEP

    6144:5XE9G3ZKGMkr5Pxsq1dMaCYLClX3fdudMhKLqRsytToJ83/xnZn+BBqtk/9x6w2G:50XGTr9zCYQ3kQs851aBqtkVeoSm3V

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 2 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2164a2718760a216917dd287196d7463bf62f8f7e834da3aa607adf712c8f2cb.exe
    "C:\Users\Admin\AppData\Local\Temp\2164a2718760a216917dd287196d7463bf62f8f7e834da3aa607adf712c8f2cb.exe"
    1⤵
    • Sets service image path in registry
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    PID:1772

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1772-0-0x0000000000400000-0x0000000000548000-memory.dmp

          Filesize

          1.3MB

        • memory/1772-4-0x0000000000400000-0x0000000000548000-memory.dmp

          Filesize

          1.3MB

        • memory/1772-8-0x0000000000400000-0x0000000000548000-memory.dmp

          Filesize

          1.3MB