Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    11/06/2024, 00:59

General

  • Target

    CFbug.exe

  • Size

    876KB

  • MD5

    031ef2689e3026c491a907a76b957ce4

  • SHA1

    3b5f31b99a253512dabf0553d501e6a21f1ada45

  • SHA256

    77a5441cf37174439f6c4957eb65820e1d32079923aeebcc06f288eaa1bc048d

  • SHA512

    1264e6f6d03ceb7f3ab15d1b26b43beda5f29c529c65c2f79e0f3e0547780d08c11c3e502a48d370bc244f99e074a0438945340991c71cf6a918d1c7e2b75522

  • SSDEEP

    12288:rN80JZv/+DZD2bJnnS7l+civY0p+rGwcR5nWFpPoSShs5K/t:rN8OdYD29nSZ+ciHp+NPbIhmK/t

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 25 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CFbug.exe
    "C:\Users\Admin\AppData\Local\Temp\CFbug.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1008

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1008-0-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1008-1-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1008-2-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1008-3-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1008-5-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1008-7-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1008-15-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1008-11-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1008-13-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1008-9-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1008-34-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1008-31-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1008-29-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1008-26-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1008-39-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1008-38-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1008-22-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1008-21-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1008-49-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1008-46-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1008-44-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1008-42-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1008-40-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1008-17-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1008-50-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB