Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    19-06-2024 03:07

General

  • Target

    bin/tools/gengp4_patch.exe

  • Size

    658KB

  • MD5

    cbbb5c7c6944f33886262d8f8c27ec97

  • SHA1

    9d819873f6c60e11155eb07e2d90829978f892b0

  • SHA256

    65042f9982e6db4c8610e8e735ca296e685518917cb71e7db42451b5069846e6

  • SHA512

    f4713641ac4e6c126a13312a6b7c732e29c45eacf377890a11edbef2e3070b30d485ce67551056062f495760a17978e3a79043b2379a5045169976352e9399a8

  • SSDEEP

    12288:Rl4axzQlopnW+xecCGTQJ5wBhebihMKB3/EId2s21qqQEzLEZEdMReVMG2:fp9Qlow5SJ3/jdhHqxQqdkG2

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bin\tools\gengp4_patch.exe
    "C:\Users\Admin\AppData\Local\Temp\bin\tools\gengp4_patch.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1992

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1992-0-0x0000000000400000-0x0000000000672000-memory.dmp

    Filesize

    2.4MB

  • memory/1992-1-0x00000000002C0000-0x00000000002C1000-memory.dmp

    Filesize

    4KB

  • memory/1992-2-0x0000000000400000-0x0000000000672000-memory.dmp

    Filesize

    2.4MB

  • memory/1992-4-0x00000000002C0000-0x00000000002C1000-memory.dmp

    Filesize

    4KB