Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/06/2024, 21:30 UTC

General

  • Target

    ArgusMonitor.exe

  • Size

    5.2MB

  • MD5

    ec29d0e790e7fc5c278b4935c48b3208

  • SHA1

    1cb92908b624779e421c536eb29ce71c08aa5426

  • SHA256

    7bc3395ec346e47fbbdafbaad7018db60dd7d21b9e22e04d852c54b836a1c592

  • SHA512

    e9a86200f03d32421f96aad0c793a84700c92017f66da826d58ff43f032ca661c93f1bda59a040c3fb5c9062e013d8835d65266235d15c58d061df2d4c7e13ee

  • SSDEEP

    98304:BJ/ThTC7iGAFZJ/6481OjUIWoQROIOUVKOH093ooQVXStgu1Y1Cg936yJkp:BJlTC7iGOu0jvS8R/4oQJSmhJO

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ArgusMonitor.exe
    "C:\Users\Admin\AppData\Local\Temp\ArgusMonitor.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3248

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3248-0-0x0000000000400000-0x0000000001887000-memory.dmp

    Filesize

    20.5MB

  • memory/3248-1-0x0000000000BED000-0x0000000000BEE000-memory.dmp

    Filesize

    4KB

  • memory/3248-2-0x0000000000400000-0x0000000001887000-memory.dmp

    Filesize

    20.5MB

  • memory/3248-4-0x000000006B800000-0x000000006B83C000-memory.dmp

    Filesize

    240KB

  • memory/3248-3-0x0000000000400000-0x0000000001887000-memory.dmp

    Filesize

    20.5MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.