Analysis

  • max time kernel
    92s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-06-2024 02:30

General

  • Target

    e67292badf82727ecbcdcfc3e721e41b48406665125a2561afba8f026bae5dc9.exe

  • Size

    1.8MB

  • MD5

    2883661fbf86ca0cf633db4b9288390e

  • SHA1

    5ef595d5b274a3378c1e8fee1c60c90b09fc788a

  • SHA256

    e67292badf82727ecbcdcfc3e721e41b48406665125a2561afba8f026bae5dc9

  • SHA512

    7e6a2e96980f923e40aaabd922b3d2dffe8f54b27608a7f26774e0380c75baf02dd056bebb7d285e1429293b7672e435329feacf203f52b141c5df9ac86787a9

  • SSDEEP

    49152:q3woVAyLrdWu5bXbnmLmom+s8KuqGaX0ToIBAUZLYwuBJh:kUu5zjmasJBAUZLWBJh

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e67292badf82727ecbcdcfc3e721e41b48406665125a2561afba8f026bae5dc9.exe
    "C:\Users\Admin\AppData\Local\Temp\e67292badf82727ecbcdcfc3e721e41b48406665125a2561afba8f026bae5dc9.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4008

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4008-0-0x0000000002470000-0x0000000002496000-memory.dmp

    Filesize

    152KB

  • memory/4008-1-0x0000000002470000-0x0000000002496000-memory.dmp

    Filesize

    152KB

  • memory/4008-2-0x0000000002470000-0x0000000002496000-memory.dmp

    Filesize

    152KB