Analysis

  • max time kernel
    0s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01/01/2024, 23:01

General

  • Target

    3e19ddfe550fed5d690d61a70ea9b6d3.exe

  • Size

    585KB

  • MD5

    3e19ddfe550fed5d690d61a70ea9b6d3

  • SHA1

    ca52159987bd493b9e4b7cfb9c0d77d12f78f49c

  • SHA256

    4a092bcc16f04d93f2bf554649fd41251a3f5a0c74b5028edef6c279c7bf15a3

  • SHA512

    ae33a4e8e80abf8ee560e4dfc493df4d56494c8e1ddb6089ae0fa886bfdbad14d396c444846b109a8af7e265ed4aa590b05604f7a2da18bc67253b6d332ccfac

  • SSDEEP

    12288:4CmsgvD4TcUTxBEOBX05vNnyL+VKrkluuzx7dlmJ8M2:piDAg805vNborkluSdU12

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 13 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e19ddfe550fed5d690d61a70ea9b6d3.exe
    "C:\Users\Admin\AppData\Local\Temp\3e19ddfe550fed5d690d61a70ea9b6d3.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2180-1-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/2180-2-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/2180-31-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2180-0-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/2180-121-0x0000000003550000-0x0000000003560000-memory.dmp

    Filesize

    64KB

  • memory/2180-150-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/2180-151-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/2180-153-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2180-152-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/2180-154-0x0000000003550000-0x0000000003560000-memory.dmp

    Filesize

    64KB

  • memory/2180-155-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/2180-156-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/2180-157-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/2180-159-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/2180-160-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/2180-161-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/2180-162-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/2180-163-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/2180-164-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/2180-165-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/2180-166-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/2180-167-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB