Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/03/2024, 01:39

General

  • Target

    cedb7491e82d9322dc21f91b14ba62aea658fea84a757f4133862aaa20638780.exe

  • Size

    2.5MB

  • MD5

    0b0a3734f08e8f4c37462746a66175ed

  • SHA1

    a4a36df8606d6879e8a0272c91b182f81881692a

  • SHA256

    cedb7491e82d9322dc21f91b14ba62aea658fea84a757f4133862aaa20638780

  • SHA512

    add7ad49d8a6261b4184f50999b5f31fe8df19c19cff73a90bbddbbdde4d445012eb22f9f7161d1df762b38a63abd7fe5bf7c759152da4ebe27b3a40a49fd9b4

  • SSDEEP

    49152:QIw3E+7/Tsr5OQFO5ybEex1PeU7zdLg4P5RyTQs3N/90nv1fdfp9Wk:zR+7YrbOmxYU7zl3PXyTQ+N/9q1fdh9B

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies Internet Explorer settings 1 TTPs 5 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cedb7491e82d9322dc21f91b14ba62aea658fea84a757f4133862aaa20638780.exe
    "C:\Users\Admin\AppData\Local\Temp\cedb7491e82d9322dc21f91b14ba62aea658fea84a757f4133862aaa20638780.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:3096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3096-0-0x0000000000400000-0x0000000000935000-memory.dmp

    Filesize

    5.2MB

  • memory/3096-7-0x0000000002AD0000-0x0000000002ADB000-memory.dmp

    Filesize

    44KB

  • memory/3096-8-0x0000000002960000-0x0000000002961000-memory.dmp

    Filesize

    4KB

  • memory/3096-9-0x0000000000400000-0x0000000000935000-memory.dmp

    Filesize

    5.2MB

  • memory/3096-10-0x0000000002AD0000-0x0000000002ADB000-memory.dmp

    Filesize

    44KB

  • memory/3096-11-0x0000000004B20000-0x0000000004B21000-memory.dmp

    Filesize

    4KB