Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    06/03/2024, 12:12

General

  • Target

    b75f3d602cdc6fe286368767ed06929d.exe

  • Size

    24KB

  • MD5

    b75f3d602cdc6fe286368767ed06929d

  • SHA1

    efac4e735ca6aca81919ea3b2c2c418afad57829

  • SHA256

    fabf4bdcf6ea6a551fdfe008ae6b856fc7b32749e4b5112413bcfb1a4ee602a5

  • SHA512

    b4fbc39433dd44b4af008998f9b497aafb23fb54a907207bbc3aba9c260a67b82362eaa6a2615d67176d3422827d5988c6dc6eb61dead126fd68a0fec79c03d7

  • SSDEEP

    384:7vILJnQOx4ZwuTyXF9LWPSW4uSZHFOQLc+EYe5XPlQZFtvtC7XSdVw:7Ejx4ZWsAFOQ5a5/a/dV

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b75f3d602cdc6fe286368767ed06929d.exe
    "C:\Users\Admin\AppData\Local\Temp\b75f3d602cdc6fe286368767ed06929d.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2316

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2316-0-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/2316-3-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB