Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2024, 09:58

General

  • Target

    b46af30f4f412682c75d25e2d6b706b6.exe

  • Size

    89KB

  • MD5

    b46af30f4f412682c75d25e2d6b706b6

  • SHA1

    5f753d8b17129a250ee9cb53e845499f55216c48

  • SHA256

    ec3f70231871a69138958f1e943f521ad344352ab1ab05b93fe7ff3eab8548e3

  • SHA512

    7e796cc668605babc643b2a74d7434fe300caab0a437943673514b693fe9acc78a008dd764498eb36397b06174e3b14a2e2102fd567f030478c2003819b53955

  • SSDEEP

    1536:0zMqujcKr/Wi58gVlpm8KzUWu+GzchAu78EmL5QcM/mCxuZ0UyR:eMq8z8gBIzUWaohWEYO3lxuzm

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b46af30f4f412682c75d25e2d6b706b6.exe
    "C:\Users\Admin\AppData\Local\Temp\b46af30f4f412682c75d25e2d6b706b6.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4644

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4644-0-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/4644-1-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/4644-3-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB