Analysis

  • max time kernel
    141s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11-03-2024 00:47

General

  • Target

    bf6777ebf62ee287116195877ed3692f.exe

  • Size

    51KB

  • MD5

    bf6777ebf62ee287116195877ed3692f

  • SHA1

    afe4c26df58c90cca1645e859d1b6cd1acc38844

  • SHA256

    b48f325d834db9e28c727041277a8d14c9fffb8275154477fa0c738a9986aaf1

  • SHA512

    2e89775f451479e778712af6d57905e7ac0c06cd750311b88a90cc11998eb93a118124e4c8a290bda87d9f5c95e962f38848bffcd4a074dcbefc5cd090073c8c

  • SSDEEP

    1536:duPvzxSzzuTSTvPGN0IFW37mCyLK3sC1auvN:QFSzyTIuN0IM37mTLK311B

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bf6777ebf62ee287116195877ed3692f.exe
    "C:\Users\Admin\AppData\Local\Temp\bf6777ebf62ee287116195877ed3692f.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2516-0-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2516-1-0x0000000000240000-0x0000000000264000-memory.dmp

    Filesize

    144KB

  • memory/2516-11-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2516-13-0x0000000000240000-0x0000000000264000-memory.dmp

    Filesize

    144KB

  • memory/2516-14-0x0000000000240000-0x0000000000264000-memory.dmp

    Filesize

    144KB

  • memory/2516-15-0x0000000000240000-0x0000000000264000-memory.dmp

    Filesize

    144KB