Analysis

  • max time kernel
    146s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240319-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/04/2024, 17:26

General

  • Target

    ImageResizerBatch.exe

  • Size

    357KB

  • MD5

    df6e28ad3f8614e059abf4c77d8650ab

  • SHA1

    891bd6eb066f12ec56118312e30a0eeb56b0b656

  • SHA256

    086ae468204b451e9b658144642617c57bb40b8b9aaa06b869d6e1aff58fd872

  • SHA512

    7cac95a134c80d2f7aee584e760b9064f319c5fcf6acc93d226497514608c935587fcec7a519b5b4b10a6579eab545051645b233ca0f73ea9edbcf0c40d33693

  • SSDEEP

    6144:c8yZw0EMTNHw7Ip+rKUEqpjyfe03qJf1zw4T/+8zXTfwcDKl+oSUl:VZ0btw6+rK5qkfe03j4j+cD4choSo

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ImageResizerBatch.exe
    "C:\Users\Admin\AppData\Local\Temp\ImageResizerBatch.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2288
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3464 --field-trial-handle=2268,i,4334050275411101233,11484630688883830558,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4116

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\GetRightToGo\ImageResizerBatch.data

      Filesize

      1KB

      MD5

      b3c8795599cb427188795d6b1fd65d71

      SHA1

      18cc8786c8c3a54a5783c90852ee0f782347ce36

      SHA256

      1c26f95b09f6ff474fdeb2e49951bdbac47f6f5ed01f9f2362d5226cf49e3690

      SHA512

      ffcba9fed93540a872b8b10d582f4a932ac6f5d7bb3e80c6ab102f9a35c52b75ff49c2ad049982ef540578baf26da85515f6cf5a9a0a25ce307c5de2a29a1da4

    • memory/2288-0-0x0000000000400000-0x000000000050A000-memory.dmp

      Filesize

      1.0MB

    • memory/2288-12-0x0000000000400000-0x000000000050A000-memory.dmp

      Filesize

      1.0MB