Analysis

  • max time kernel
    141s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07/06/2024, 11:40

General

  • Target

    322990fa4bd60b0d3a2df87c3543f82bc5e3825f8357eb27a2d80aab0969afa4.exe

  • Size

    1.9MB

  • MD5

    d467f4e3d950cffad657af67e9844f6b

  • SHA1

    023324332ec3437e9eeaa512318c2b62dcf18296

  • SHA256

    322990fa4bd60b0d3a2df87c3543f82bc5e3825f8357eb27a2d80aab0969afa4

  • SHA512

    e79209661464aaeb0374e4d9694efd519aaf6a978e30d3e8318c45bc3ac47de57fa81230f56b85a14ddf9967f22a92d8267cc9ffb33f681d20c1f551181d8050

  • SSDEEP

    24576:UvxlJ9d6IscEUIUH0JCYcQb4uTtyaXWnjovY+1N9f2+W4upMtMAHn8J+RgBbN89i:ULJ96cZH08mr0AWknUxmQlbN+cf

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 15 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\322990fa4bd60b0d3a2df87c3543f82bc5e3825f8357eb27a2d80aab0969afa4.exe
    "C:\Users\Admin\AppData\Local\Temp\322990fa4bd60b0d3a2df87c3543f82bc5e3825f8357eb27a2d80aab0969afa4.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:1924

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\temp\filelist.dat

          Filesize

          30KB

          MD5

          865136977962fea2dd67931c14bf60b5

          SHA1

          bebafc23d7b2e8cd0a8bcfb86422f933d182ae6f

          SHA256

          b97a19f9ae7247b42dc4614be0b72a6bb4ba6bd057bb9eedd901a38d8f4cf44f

          SHA512

          46581473cfcab33020e00ccc20fd9fbd90f31763303ec391f6ded8d7ee0083320b5149651b366e3e0fcfc56e4b3ab355647093e840d9dbc7c3487194e5cef6bf

        • memory/1924-1264-0x0000000006540000-0x0000000006560000-memory.dmp

          Filesize

          128KB

        • memory/1924-1267-0x0000000000400000-0x00000000007A7000-memory.dmp

          Filesize

          3.7MB

        • memory/1924-1257-0x0000000000400000-0x00000000007A7000-memory.dmp

          Filesize

          3.7MB

        • memory/1924-1260-0x0000000006540000-0x0000000006560000-memory.dmp

          Filesize

          128KB

        • memory/1924-1261-0x0000000006540000-0x0000000006560000-memory.dmp

          Filesize

          128KB

        • memory/1924-1262-0x0000000000400000-0x00000000007A7000-memory.dmp

          Filesize

          3.7MB

        • memory/1924-1263-0x0000000000400000-0x00000000007A7000-memory.dmp

          Filesize

          3.7MB

        • memory/1924-0-0x0000000000400000-0x00000000007A7000-memory.dmp

          Filesize

          3.7MB

        • memory/1924-1252-0x0000000000400000-0x00000000007A7000-memory.dmp

          Filesize

          3.7MB

        • memory/1924-1265-0x0000000000400000-0x00000000007A7000-memory.dmp

          Filesize

          3.7MB

        • memory/1924-1266-0x0000000000400000-0x00000000007A7000-memory.dmp

          Filesize

          3.7MB

        • memory/1924-1268-0x0000000000400000-0x00000000007A7000-memory.dmp

          Filesize

          3.7MB

        • memory/1924-1269-0x0000000000400000-0x00000000007A7000-memory.dmp

          Filesize

          3.7MB

        • memory/1924-1270-0x0000000000400000-0x00000000007A7000-memory.dmp

          Filesize

          3.7MB

        • memory/1924-1271-0x0000000000400000-0x00000000007A7000-memory.dmp

          Filesize

          3.7MB

        • memory/1924-1272-0x0000000000400000-0x00000000007A7000-memory.dmp

          Filesize

          3.7MB

        • memory/1924-1273-0x0000000000400000-0x00000000007A7000-memory.dmp

          Filesize

          3.7MB

        • memory/1924-1274-0x0000000000400000-0x00000000007A7000-memory.dmp

          Filesize

          3.7MB