Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01/02/2024, 21:36 UTC

General

  • Target

    875bc60635214b1b55753dfc67c64645.exe

  • Size

    781KB

  • MD5

    875bc60635214b1b55753dfc67c64645

  • SHA1

    d0a0ee908bdeed876cd9919391716639a177eecc

  • SHA256

    a316d0c958f134317e4973709cf2d739c81d82654b6c6298d206cd3f193f13a0

  • SHA512

    4b6b97a8577a86a0bd2bb08847453d90c50202f981619c6d20b205146a767ae089729f3a891ea5cd7c0951431d9d684669fe1d1cee1def4f18744004e0bbb9f6

  • SSDEEP

    12288:+4McvkhI1orsI62RB45GLQjzEB4lkOp6dxBH2tY85Mn7mv55w:dgsB2RBWGEjo6lK8m85Mn7j

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\875bc60635214b1b55753dfc67c64645.exe
    "C:\Users\Admin\AppData\Local\Temp\875bc60635214b1b55753dfc67c64645.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2008

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2008-0-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2008-3-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.