Analysis

  • max time kernel
    91s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/01/2024, 15:10

General

  • Target

    6fc06502b6260a1cc79ce3694928bd75.exe

  • Size

    807KB

  • MD5

    6fc06502b6260a1cc79ce3694928bd75

  • SHA1

    9f93a8de843787692ec39ab1dfc2be062214b09a

  • SHA256

    24b42a920a1b1aa3e6738d2cc759f92670399fc93af253defb0cff733e0d7943

  • SHA512

    566f82bb247b8a3106c6ecaf37f159104b4fc00ac9797fd8e2e2f55b27cdb29b78878fd46402dcd1bc6a2aadb5724a1f0d16a400ded77e7af38c99ff69b0bec3

  • SSDEEP

    24576:SQC/Ac7vlzePJJ92Mi2vI5BIXSTitrnBVTv/YiN1DesGWKi:SQC/rgPlNvI5+1rnB9/YiNxeA

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6fc06502b6260a1cc79ce3694928bd75.exe
    "C:\Users\Admin\AppData\Local\Temp\6fc06502b6260a1cc79ce3694928bd75.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3540
    • C:\Users\Admin\AppData\Local\Temp\setup.exe
      C:\Users\Admin\AppData\Local\Temp\setup.exe relaunch
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3436
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3436 -s 1680
        3⤵
        • Program crash
        PID:2960
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3436 -ip 3436
    1⤵
      PID:2636

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\setup.exe

            Filesize

            807KB

            MD5

            6fc06502b6260a1cc79ce3694928bd75

            SHA1

            9f93a8de843787692ec39ab1dfc2be062214b09a

            SHA256

            24b42a920a1b1aa3e6738d2cc759f92670399fc93af253defb0cff733e0d7943

            SHA512

            566f82bb247b8a3106c6ecaf37f159104b4fc00ac9797fd8e2e2f55b27cdb29b78878fd46402dcd1bc6a2aadb5724a1f0d16a400ded77e7af38c99ff69b0bec3

          • memory/3436-6-0x0000000000200000-0x000000000045F000-memory.dmp

            Filesize

            2.4MB

          • memory/3436-7-0x0000000000200000-0x000000000045F000-memory.dmp

            Filesize

            2.4MB

          • memory/3540-0-0x0000000000410000-0x000000000066F000-memory.dmp

            Filesize

            2.4MB

          • memory/3540-5-0x0000000000410000-0x000000000066F000-memory.dmp

            Filesize

            2.4MB