Analysis

  • max time kernel
    142s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/01/2024, 02:10

General

  • Target

    737635c55580df98bc5e31e487891aae.exe

  • Size

    8.0MB

  • MD5

    737635c55580df98bc5e31e487891aae

  • SHA1

    6db42865c0ac2947ff55ef2ae6275c523d1a40d9

  • SHA256

    4e2c24781a5602694728a2176f682f48d2d8427edcd8b0fc646680c557281e86

  • SHA512

    490744825984c89148df57a517859053e262ad795a4797a4e57ee01df3d076544d1524ad6bf3bcce82ef8822608e2878175f979dab86262ef91d3f0eed9c6b5c

  • SSDEEP

    196608:MdvwbRglG2jDc8sbq6vmamwLeIQpbde+7KOEDEy3U8:MebRgG2jfQq+mamwLefbs+CImU8

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\737635c55580df98bc5e31e487891aae.exe
    "C:\Users\Admin\AppData\Local\Temp\737635c55580df98bc5e31e487891aae.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2316-0-0x0000000000400000-0x000000000058B000-memory.dmp

    Filesize

    1.5MB

  • memory/2316-1-0x00000000006F0000-0x00000000006F6000-memory.dmp

    Filesize

    24KB

  • memory/2316-2-0x0000000000400000-0x000000000058B000-memory.dmp

    Filesize

    1.5MB

  • memory/2316-6-0x0000000002350000-0x0000000002351000-memory.dmp

    Filesize

    4KB

  • memory/2316-7-0x0000000000400000-0x000000000058B000-memory.dmp

    Filesize

    1.5MB

  • memory/2316-9-0x0000000002350000-0x0000000002351000-memory.dmp

    Filesize

    4KB