Analysis

  • max time kernel
    140s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18-03-2024 21:01

General

  • Target

    d484f4d29e9ec1bb52223bae8ce33757.exe

  • Size

    46KB

  • MD5

    d484f4d29e9ec1bb52223bae8ce33757

  • SHA1

    9d3cb00c65b5249f3a161fdd770bf0bc40821387

  • SHA256

    3c1756dff493e990418fc7011eaf708583336a02cd26887c572e6b4d0035b76d

  • SHA512

    bd16f27a399db1fc4f4cf03e9d939036195c6577e53bff53926a108b5d386dd452aa3e1dbdd71a633579b801674cb505a2011cbe0f5a9d59d6e58dde19624eeb

  • SSDEEP

    768:ETIBAkmNnSjp5TPNzuxAhfYuuy1NCTLkhZoESN31S230Hy87YEOtqI2ind885:ET002pNUxAhfkiClS2kHjcjZf

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d484f4d29e9ec1bb52223bae8ce33757.exe
    "C:\Users\Admin\AppData\Local\Temp\d484f4d29e9ec1bb52223bae8ce33757.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2328

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2328-0-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2328-3-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB