Analysis

  • max time kernel
    39s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/01/2024, 08:36

General

  • Target

    488373c584ab511ad1ddd1025f2a7f5e.exe

  • Size

    556KB

  • MD5

    488373c584ab511ad1ddd1025f2a7f5e

  • SHA1

    e92baf47e6e8648325f1f6eb41146810dc05a9dd

  • SHA256

    3f871ee2eef91764cc6af09f3529687875053d4ed91424a6c31fe71bbd078e82

  • SHA512

    fc8554f33cb74c8e487374b40b2de29604472c98748b92dd6e9391f8fb65d3c112d00b5ddfe300606e31690d49c0227487045a5ac103cecd6526a835db3dd102

  • SSDEEP

    12288:7GMVWEswD7o/Aoy51aISoO+YlyeU81GYOCmBmXHKwMMzk:7GSWEhnoIooSUY40G4imXHKwMMzk

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\488373c584ab511ad1ddd1025f2a7f5e.exe
    "C:\Users\Admin\AppData\Local\Temp\488373c584ab511ad1ddd1025f2a7f5e.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Users\Admin\AppData\Local\Temp\488373c584ab511ad1ddd1025f2a7f5e.exe
      "C:\Users\Admin\AppData\Local\Temp\488373c584ab511ad1ddd1025f2a7f5e.exe" /_ShowProgress
      2⤵
        PID:3932

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1908-169-0x0000000000400000-0x0000000000521000-memory.dmp

      Filesize

      1.1MB

    • memory/1908-170-0x0000000000400000-0x0000000000521000-memory.dmp

      Filesize

      1.1MB

    • memory/1908-1-0x0000000000400000-0x0000000000521000-memory.dmp

      Filesize

      1.1MB

    • memory/1908-3-0x00000000006B0000-0x00000000006B1000-memory.dmp

      Filesize

      4KB

    • memory/1908-92-0x0000000000400000-0x0000000000521000-memory.dmp

      Filesize

      1.1MB

    • memory/1908-174-0x0000000000400000-0x0000000000521000-memory.dmp

      Filesize

      1.1MB

    • memory/1908-173-0x0000000000400000-0x0000000000521000-memory.dmp

      Filesize

      1.1MB

    • memory/1908-172-0x0000000000400000-0x0000000000521000-memory.dmp

      Filesize

      1.1MB

    • memory/1908-171-0x0000000000400000-0x0000000000521000-memory.dmp

      Filesize

      1.1MB

    • memory/1908-100-0x00000000006B0000-0x00000000006B1000-memory.dmp

      Filesize

      4KB

    • memory/1908-2-0x0000000000400000-0x0000000000521000-memory.dmp

      Filesize

      1.1MB

    • memory/1908-164-0x0000000000400000-0x0000000000521000-memory.dmp

      Filesize

      1.1MB

    • memory/1908-135-0x0000000000400000-0x0000000000521000-memory.dmp

      Filesize

      1.1MB

    • memory/1908-166-0x0000000000400000-0x0000000000521000-memory.dmp

      Filesize

      1.1MB

    • memory/1908-167-0x0000000000400000-0x0000000000521000-memory.dmp

      Filesize

      1.1MB

    • memory/1908-0-0x0000000000400000-0x0000000000521000-memory.dmp

      Filesize

      1.1MB

    • memory/1908-165-0x0000000000400000-0x0000000000521000-memory.dmp

      Filesize

      1.1MB

    • memory/3932-94-0x0000000000400000-0x0000000000521000-memory.dmp

      Filesize

      1.1MB

    • memory/3932-95-0x0000000000400000-0x0000000000521000-memory.dmp

      Filesize

      1.1MB

    • memory/3932-96-0x0000000000400000-0x0000000000521000-memory.dmp

      Filesize

      1.1MB

    • memory/3932-97-0x0000000000710000-0x0000000000711000-memory.dmp

      Filesize

      4KB