Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19-01-2024 09:14

General

  • Target

    673f04002f5f4e66f1f216e58ca5d14f.exe

  • Size

    1.1MB

  • MD5

    673f04002f5f4e66f1f216e58ca5d14f

  • SHA1

    c2c5ee0ea048831f0236038c941a056d15bc078f

  • SHA256

    0531a2c465c2c03d10e7d82eb9ba7a1500d57305be0eea2ea4b786b759700122

  • SHA512

    19eac909d2f7e150eca12658921d301038055ce79ec50c066c6cd30d4a01f28daa06c95363feb7ed368d6b197c119dcf76eff2574625673448b10a652c73b848

  • SSDEEP

    24576:xNNZDLYpuZu75u4v1nBT9GxEPeXzXz4kGoiiiiwgGEfc:Lj86MRdnBhGx2eXzje9iwx

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\673f04002f5f4e66f1f216e58ca5d14f.exe
    "C:\Users\Admin\AppData\Local\Temp\673f04002f5f4e66f1f216e58ca5d14f.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2512

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2512-0-0x0000000000400000-0x00000000006EC000-memory.dmp

    Filesize

    2.9MB

  • memory/2512-1-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2512-2-0x0000000003230000-0x0000000003231000-memory.dmp

    Filesize

    4KB

  • memory/2512-3-0x0000000000400000-0x00000000006EC000-memory.dmp

    Filesize

    2.9MB

  • memory/2512-5-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2512-6-0x0000000003230000-0x0000000003231000-memory.dmp

    Filesize

    4KB