Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-01-2024 21:13

General

  • Target

    7e04d9811ffb8050006199b7149e0284.exe

  • Size

    234KB

  • MD5

    7e04d9811ffb8050006199b7149e0284

  • SHA1

    c7b5fe0759069bdfa30aaeead19dc5bebc5cdf01

  • SHA256

    c6140f8e8ba64466e57bab73bed3b5c69ee22d5e6d828072626376dc03fe6672

  • SHA512

    da60249464db7f2b5f5698406eb046ef3ea7d7aaba5a58354e92376549147dac2f26c5d8b9017b784684beae84686ff8fe18955731550619b0944a9d09028a74

  • SSDEEP

    6144:N6/HfGdFjZvU1MSGTRa4T3nw9hr4A9KW4uaSoSWO5:KH8FjZsCZYg3crzkX6oSWO5

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e04d9811ffb8050006199b7149e0284.exe
    "C:\Users\Admin\AppData\Local\Temp\7e04d9811ffb8050006199b7149e0284.exe"
    1⤵
    • Checks whether UAC is enabled
    • Suspicious use of SetWindowsHookEx
    PID:4972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4972-0-0x0000000000400000-0x00000000005E1000-memory.dmp

    Filesize

    1.9MB

  • memory/4972-15-0x0000000000400000-0x00000000005E1000-memory.dmp

    Filesize

    1.9MB

  • memory/4972-17-0x0000000000400000-0x00000000005E1000-memory.dmp

    Filesize

    1.9MB