Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/02/2024, 21:34

General

  • Target

    aa355413985bc737c72a81e5a1ac3462.exe

  • Size

    103KB

  • MD5

    aa355413985bc737c72a81e5a1ac3462

  • SHA1

    93727fd34a0d1532d9a9484ac9c45236341076b5

  • SHA256

    f666d62caa4b2e9fbf66f4657b6b7740b190e858650c2bbe21d79dfc2126b1d0

  • SHA512

    e01f2fbdbc5c64f0654e1ffba50e56aca0c9341be7c1bba11345de0aa73cced522701c8f1079c7acb7b426798b8428c73e32f2fbcbadb517a79d570174b92e3d

  • SSDEEP

    1536:xRudF3lmBboCuezR8Iq6FQoTWIsmaxH0uI/JFeDMDh40O2CcqIMzqCkSlDFw0Rp+:X6lmBZuw8IqyQoK/7l0lB3qImDrf3M

Score
7/10
upx

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aa355413985bc737c72a81e5a1ac3462.exe
    "C:\Users\Admin\AppData\Local\Temp\aa355413985bc737c72a81e5a1ac3462.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks processor information in registry
    • Suspicious use of SetWindowsHookEx
    PID:5040

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/5040-0-0x0000000000400000-0x0000000000461000-memory.dmp

          Filesize

          388KB

        • memory/5040-1-0x0000000000400000-0x0000000000461000-memory.dmp

          Filesize

          388KB