Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/03/2024, 15:54

General

  • Target

    bc357146fd66709162702f3e465ff1a4.exe

  • Size

    260KB

  • MD5

    bc357146fd66709162702f3e465ff1a4

  • SHA1

    3bab414620e1eca06eade26ae3e2f0549e51abfe

  • SHA256

    75dec61a33531fd1a8ee8e9af4d10cb97d53db3c13c641df3c4df441cdf25517

  • SHA512

    37c09a00ceb1e8ed5057b5cfafe2d473276b722ade57242b9729a81076425cf41f37b41b07298f2587ed9a81dda9c7f7bf728fa7306c7420de9ed0a2bf61e31c

  • SSDEEP

    6144:Y4jseEhMKQ9qi9OttMHa/EfbvjrngREeHtSYlH9mIXnn:Y9eKHZbArrgPPhn

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc357146fd66709162702f3e465ff1a4.exe
    "C:\Users\Admin\AppData\Local\Temp\bc357146fd66709162702f3e465ff1a4.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Users\Admin\AppData\Local\Temp\bc357146fd66709162702f3e465ff1a4.exe
      C:\Users\Admin\AppData\Local\Temp\bc357146fd66709162702f3e465ff1a4.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Users\Admin\AppData\Local\Temp\bc357146fd66709162702f3e465ff1a4.exe
        C:\Users\Admin\AppData\Local\Temp\bc357146fd66709162702f3e465ff1a4.exe
        3⤵
          PID:2060

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1712-6-0x0000000000400000-0x0000000000519000-memory.dmp

      Filesize

      1.1MB

    • memory/1712-3-0x0000000000400000-0x0000000000519000-memory.dmp

      Filesize

      1.1MB

    • memory/1712-0-0x0000000000400000-0x0000000000519000-memory.dmp

      Filesize

      1.1MB

    • memory/2032-12-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/2032-7-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/2032-8-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/2032-4-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/2032-14-0x00000000028A0000-0x00000000029B9000-memory.dmp

      Filesize

      1.1MB

    • memory/2060-11-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2060-15-0x0000000000400000-0x00000000004083A0-memory.dmp

      Filesize

      32KB

    • memory/2060-16-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2060-17-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2060-18-0x0000000000400000-0x00000000004083A0-memory.dmp

      Filesize

      32KB

    • memory/2060-19-0x0000000010000000-0x0000000010012000-memory.dmp

      Filesize

      72KB