Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 14:22

General

  • Target

    b5732ac85589fdbe360af0d41fe4b409796fe414999c785bcf11f9b092ecf028.exe

  • Size

    3.5MB

  • MD5

    939261459f9c29343dd1d6bd51f3709e

  • SHA1

    b1110b91465ebc137402a3c30842b0e87e870365

  • SHA256

    b5732ac85589fdbe360af0d41fe4b409796fe414999c785bcf11f9b092ecf028

  • SHA512

    697e447e742854cc4a9111b6451f2eed31d8d87b5db595ac6958ddd4f93110d1ad5e154c01a8b64db1cd7e26dcfffd637e183315a6aeeb7899ebc76c64f321db

  • SSDEEP

    98304:yrhykOZOI5gDEmc6Bmc3NshwCZwPSfl7R3e1T:yrhsUvEckwCZxltO1

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b5732ac85589fdbe360af0d41fe4b409796fe414999c785bcf11f9b092ecf028.exe
    "C:\Users\Admin\AppData\Local\Temp\b5732ac85589fdbe360af0d41fe4b409796fe414999c785bcf11f9b092ecf028.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2936

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2936-0-0x000000013F990000-0x0000000140BCF000-memory.dmp

    Filesize

    18.2MB

  • memory/2936-1-0x000000013F990000-0x0000000140BCF000-memory.dmp

    Filesize

    18.2MB

  • memory/2936-4-0x000000013F990000-0x0000000140BCF000-memory.dmp

    Filesize

    18.2MB