Analysis

  • max time kernel
    136s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-01-2024 10:15

General

  • Target

    5af9ca2471e7ab41eef0c8bdc6b37490.exe

  • Size

    36KB

  • MD5

    5af9ca2471e7ab41eef0c8bdc6b37490

  • SHA1

    2e66f36b1c554131bbac49262d8c63301e7dd3bc

  • SHA256

    04dfd43b74a06211ad8263433617464454642cd2f05e6ba83c8cdd88c1089b5e

  • SHA512

    2dfcacde98cb4397914e952fb48e3be2ee2253a6dc26c699082b57fb49b718a89d8f3ae07d63e91de2970abeda2f9e5b5bcfc0bedc95a42094ad81518d95e3f6

  • SSDEEP

    768:46IDAE0CI/cLC7w/UAptnyckyaTtnfcz0aofFLnsBrl3ZZh:42uZ2ROnyvy+tnRamo9ZZh

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5af9ca2471e7ab41eef0c8bdc6b37490.exe
    "C:\Users\Admin\AppData\Local\Temp\5af9ca2471e7ab41eef0c8bdc6b37490.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1212

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1212-0-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/1212-3-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB