Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/01/2024, 22:25

General

  • Target

    788b6f375132b88f9e17ac3837979a0f.exe

  • Size

    57KB

  • MD5

    788b6f375132b88f9e17ac3837979a0f

  • SHA1

    c85229ab9df596bf62ff825bee4b3b8409964e4e

  • SHA256

    ce15e2a38f112162516970c53b0aaf983307cd617ed606512eff9d839c17dc6c

  • SHA512

    d196ca01af57bf3337996e295d877ee42927078b807d52093268d5c91dd60a48d5be76dfc01450656ed5df34bb8882ca5ae6f60401501cd43c3df065bbe49985

  • SSDEEP

    768:0kZAWxVGZsQ6ces/YvzzGqruANTEFEWOZnPdZ4qd17gABRM5X07uog3Nu+5cgm:FmypnNTGERZn1Z4eHRMxKKNu

Score
7/10
upx

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\788b6f375132b88f9e17ac3837979a0f.exe
    "C:\Users\Admin\AppData\Local\Temp\788b6f375132b88f9e17ac3837979a0f.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    PID:2452

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\nuyuy.dll

    Filesize

    81KB

    MD5

    3b6d470e9dcdd7f62469e2e3de26848c

    SHA1

    01e4ac9cf53eaad3d5144e2864b056bb8ced94ee

    SHA256

    f802e6ad5de4b4f8f9209b22f01eddc4115e848d226307e9140ca7bc92c7f43a

    SHA512

    a9670a26a364ef1a4380a79e419b450d2ed70eea8f9de3b62f9ff626ee4a0890ddd302107d2ae78f5418035c8888ef802f3726271b614f280410273971bdab29

  • memory/2452-0-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2452-6-0x00000000003B0000-0x00000000003C9000-memory.dmp

    Filesize

    100KB

  • memory/2452-9-0x00000000003B0000-0x00000000003C9000-memory.dmp

    Filesize

    100KB

  • memory/2452-8-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB