Analysis

  • max time kernel
    141s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/02/2024, 05:33

General

  • Target

    8e56ed0c2d85c3a581ebd1025278c29a.exe

  • Size

    191KB

  • MD5

    8e56ed0c2d85c3a581ebd1025278c29a

  • SHA1

    e3452ce40cbd2c0a6210865d490c4dd80ba62d87

  • SHA256

    8dfd2423295002049f9084eb66e2213931d7caa05d9d8e4bc8260154e769c099

  • SHA512

    904b31ac72c7094314649c7df8dfdd0952696ffe7d725e53f941d449290fae7e7f34fbefc42983c953838f23edb18bcc670c8cf0010cf82c77ad9ee4c58b666e

  • SSDEEP

    3072:FdTejYQcRkBtZy/kqtcGxekIQ8bqJLSjDexH0THKLW15Y5dyO5SDLm9qJV8Vd1vm:PWfUkBPyrtBxgQTMK0TKpxS3H8j0br

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e56ed0c2d85c3a581ebd1025278c29a.exe
    "C:\Users\Admin\AppData\Local\Temp\8e56ed0c2d85c3a581ebd1025278c29a.exe"
    1⤵
    • Checks whether UAC is enabled
    • Suspicious use of SetWindowsHookEx
    PID:3692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3692-0-0x0000000000400000-0x000000000056B000-memory.dmp

    Filesize

    1.4MB

  • memory/3692-15-0x0000000000400000-0x000000000056B000-memory.dmp

    Filesize

    1.4MB

  • memory/3692-17-0x0000000000400000-0x000000000056B000-memory.dmp

    Filesize

    1.4MB