Analysis

  • max time kernel
    144s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-03-2024 08:00

General

  • Target

    IMG3105E.exe

  • Size

    18KB

  • MD5

    c09b107afc5a74ea3418e178c588086b

  • SHA1

    7846e4ad423ff100d99f22e4062e4ae6b57cc381

  • SHA256

    c8224adcb9c3acec1c5990fb3da2d40906badc7b97b4328b260c0d560544aa0d

  • SHA512

    992cfd953e359efcd4145824fac7ea76a1e2f2e1eed25447b4e1322803e517927f47e8c87e403058d285f6113dae7b9f388deec4774fe8ba070e99f183c81143

  • SSDEEP

    192:82SXjC5Xs5UTVPo5yE17XKYvvemz5jBhb6duByhU2Mp16WwmLv5fYj0SuPcO:82SXCc49E1X5TlBt6oI+z/6WdvsuPcO

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\IMG3105E.exe
    "C:\Users\Admin\AppData\Local\Temp\IMG3105E.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3880

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3880-0-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/3880-3-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB