Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/01/2024, 22:49

General

  • Target

    7898aae2ea8f1e3c0bbd9074d1454f71.exe

  • Size

    655KB

  • MD5

    7898aae2ea8f1e3c0bbd9074d1454f71

  • SHA1

    9a8eb69a04206f07c3cb118700e5e67dc5d5cd50

  • SHA256

    133ca00af9478427a0e1137930fa24b05dfa4c6ccf3729ad7fef22ad10413d77

  • SHA512

    852706bdc02986e5fba171e309b9dcc95688396decd15d520734e178c59f3ef88a3eb2d3cc23f5f23f77d79cb20c1fe2a4e375ea0e5bca0359707f5e6eb635ff

  • SSDEEP

    12288:PHiPuXjJ0Vykv2gIHk/ZPBcoxV3H4KP6cLzGiHlcvsZ+u8Sm0eSBtDjUlTK:/H+Fv2gIHuH5PJLaiFcvsZ+jS2K

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 17 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7898aae2ea8f1e3c0bbd9074d1454f71.exe
    "C:\Users\Admin\AppData\Local\Temp\7898aae2ea8f1e3c0bbd9074d1454f71.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4968

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4968-0-0x0000000000400000-0x00000000005D8000-memory.dmp

    Filesize

    1.8MB

  • memory/4968-3-0x0000000000400000-0x00000000005D8000-memory.dmp

    Filesize

    1.8MB

  • memory/4968-4-0x0000000000400000-0x00000000005D8000-memory.dmp

    Filesize

    1.8MB

  • memory/4968-5-0x0000000000400000-0x00000000005D8000-memory.dmp

    Filesize

    1.8MB

  • memory/4968-6-0x0000000000400000-0x00000000005D8000-memory.dmp

    Filesize

    1.8MB

  • memory/4968-7-0x0000000000400000-0x00000000005D8000-memory.dmp

    Filesize

    1.8MB

  • memory/4968-8-0x0000000000400000-0x00000000005D8000-memory.dmp

    Filesize

    1.8MB

  • memory/4968-9-0x0000000000400000-0x00000000005D8000-memory.dmp

    Filesize

    1.8MB

  • memory/4968-10-0x0000000000400000-0x00000000005D8000-memory.dmp

    Filesize

    1.8MB

  • memory/4968-11-0x0000000000400000-0x00000000005D8000-memory.dmp

    Filesize

    1.8MB

  • memory/4968-12-0x0000000000400000-0x00000000005D8000-memory.dmp

    Filesize

    1.8MB

  • memory/4968-13-0x0000000000400000-0x00000000005D8000-memory.dmp

    Filesize

    1.8MB

  • memory/4968-14-0x0000000000400000-0x00000000005D8000-memory.dmp

    Filesize

    1.8MB

  • memory/4968-15-0x0000000000400000-0x00000000005D8000-memory.dmp

    Filesize

    1.8MB

  • memory/4968-16-0x0000000000400000-0x00000000005D8000-memory.dmp

    Filesize

    1.8MB

  • memory/4968-17-0x0000000000400000-0x00000000005D8000-memory.dmp

    Filesize

    1.8MB

  • memory/4968-18-0x0000000000400000-0x00000000005D8000-memory.dmp

    Filesize

    1.8MB