Analysis

  • max time kernel
    141s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-02-2024 17:55

General

  • Target

    9c4accea47479e7aefd9fea5ac09069e.exe

  • Size

    217KB

  • MD5

    9c4accea47479e7aefd9fea5ac09069e

  • SHA1

    a754e5a8acd6e2ba5d2d7e36ec41472be89ef293

  • SHA256

    ddf11a3ebdaf52191eb571158baea1e0c700c905710c16e695e0672c3fcb1a9a

  • SHA512

    1e10fbce765e8ef66b2e9b6a5f46d22a646e4a7d87630d150eda9d61de9cc70bc926dc5e73d0f1e926cfb656f9b1f8ae825b1c7ecd0e77904cba41d345bc4e01

  • SSDEEP

    3072:qlsJb+UUdrUeY7NbNQht4fEDUxVi33k6mV5SfSzy5yL+ri/082w+FfgoxNNgH9n:WsNzksxqrpDUxViHuKCy5yL+r/tg2

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9c4accea47479e7aefd9fea5ac09069e.exe
    "C:\Users\Admin\AppData\Local\Temp\9c4accea47479e7aefd9fea5ac09069e.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:5100

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5100-0-0x0000000000400000-0x000000000063F000-memory.dmp

    Filesize

    2.2MB

  • memory/5100-8-0x0000000000400000-0x000000000063F000-memory.dmp

    Filesize

    2.2MB