Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-05-2024 10:15

General

  • Target

    0fcfc3b736ef63d17e6f9228d55c91279130686af6d35739c3baa3f383601c82.exe

  • Size

    1.3MB

  • MD5

    a9e00b6d4710def9b4ba12f1863a9ed4

  • SHA1

    6fd5134897395d91a4c999546b5d2d2b13edbc1e

  • SHA256

    0fcfc3b736ef63d17e6f9228d55c91279130686af6d35739c3baa3f383601c82

  • SHA512

    17e28da55cca3a1a54c3ba5f7364d0815bba4abf92ea16db64aa1bf99a6020e0035361ada584a4fbacf94e5c808adb4dd737e00985740e2d11043ce102066d3c

  • SSDEEP

    24576:J7UwVlkLzIenLlZQsdR4OMqR+sma7+Zk8NbxcN:JdmfnLlTb4OlR+1o+RD

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0fcfc3b736ef63d17e6f9228d55c91279130686af6d35739c3baa3f383601c82.exe
    "C:\Users\Admin\AppData\Local\Temp\0fcfc3b736ef63d17e6f9228d55c91279130686af6d35739c3baa3f383601c82.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3228

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\I50YRZD3\9YWH1IXP.htm

    Filesize

    398KB

    MD5

    0bc7a071680abe162e84c2fbbd95da09

    SHA1

    0af7683d1f16798577afc2d20e3e9a568eb5cf2d

    SHA256

    30217332cbe6ee39d23313cea38919a5d542faa31b957d70c387ae3f8ebf61ad

    SHA512

    9166c26346d533f25de189e89368c8932e6d2b8422c3cf58eda2baa323cb041f83e6101020dc167d438c24968a52aa730daec7f9d21ca797f306987ac7dcdf7d

  • memory/3228-0-0x0000000000400000-0x0000000000550000-memory.dmp

    Filesize

    1.3MB

  • memory/3228-20-0x0000000000400000-0x0000000000550000-memory.dmp

    Filesize

    1.3MB