Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/03/2024, 14:43

General

  • Target

    d3c43596fd6c91603b1d09d0f2c5d648.exe

  • Size

    28KB

  • MD5

    d3c43596fd6c91603b1d09d0f2c5d648

  • SHA1

    06a82be80807355ce33add2106020cf6ef561136

  • SHA256

    f7882faba3a2b66309454690d943a16f4b2f9c8ac9ffa8c946a8c6e3df7725ac

  • SHA512

    d66c904d4c79d6884ead0d04d0e1f1cf773572b459da268bd798060564a2d8bd81ed9c4dfc55c441e910ff43319f4068f105b75e1dba1cda4e4bd67a968aa8f5

  • SSDEEP

    96:/lxqs4vQiOXiJlwd9zx0ZLukSZTTwLaabmG8CL3uSTyaabmG8CL3uSTY1aabmG8G:/TqSXSY9Vk5T93jy93jo93jZMi

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d3c43596fd6c91603b1d09d0f2c5d648.exe
    "C:\Users\Admin\AppData\Local\Temp\d3c43596fd6c91603b1d09d0f2c5d648.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    PID:3520

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3520-0-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/3520-3-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB