Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    26/03/2024, 14:52

General

  • Target

    df6e3b6505dd897150d452f50e0a3957.exe

  • Size

    58KB

  • MD5

    df6e3b6505dd897150d452f50e0a3957

  • SHA1

    121eec01039f03728fef3d6f747c5f930016e24c

  • SHA256

    d00f86ee249e791ceb2b2968fd67f6f8009ebbd31a80a215a0bbfd0cf193dcee

  • SHA512

    a05de49e99189a1098343d3d72352f0cd0d096124817246e4877a888ca9c931f6171cbe662744f487a21943a01fe9d920691a4124c71a22252f63e8ff943b7b6

  • SSDEEP

    1536:/cFRfLarrRhG/RRAEkAoXM8hc6D2unGP1+3:ErA4/RRyAwXc22Kz

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df6e3b6505dd897150d452f50e0a3957.exe
    "C:\Users\Admin\AppData\Local\Temp\df6e3b6505dd897150d452f50e0a3957.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2396

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2396-0-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB

        • memory/2396-3-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB