Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27/06/2024, 10:23 UTC

General

  • Target

    870ac479b15f749355d2955a1d05070cc2468551f02c6aba0da46c7f8c97716d.exe

  • Size

    15.7MB

  • MD5

    8d87de02232bbb731e8b86fa98c4e219

  • SHA1

    3a57b9109ef04ea78a04c61b01287dc854a2abda

  • SHA256

    870ac479b15f749355d2955a1d05070cc2468551f02c6aba0da46c7f8c97716d

  • SHA512

    bbeacd4bccb374772a867e0197232a713cf7c7f21a7c84d91bbd3b1e0ec27d7fa093aeb6fe5cf8ef10101d35c3f05f5369e5a532d1832a7fa4b1d1968f09964f

  • SSDEEP

    393216:W8yL9Kh7aC5Kvsvpmx0V8iEac9stTPFZ9:KKh35Kvsxmx0V8h70TPFZ9

Score
7/10
upx

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\870ac479b15f749355d2955a1d05070cc2468551f02c6aba0da46c7f8c97716d.exe
    "C:\Users\Admin\AppData\Local\Temp\870ac479b15f749355d2955a1d05070cc2468551f02c6aba0da46c7f8c97716d.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:2964

Network

    No results found
  • 124.223.157.104:83
    870ac479b15f749355d2955a1d05070cc2468551f02c6aba0da46c7f8c97716d.exe
    152 B
    3
No results found

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\E2EECore.2.7.2.dll

    Filesize

    8.4MB

    MD5

    8b6c94bbdbfb213e94a5dcb4fac28ce3

    SHA1

    b56102ca4f03556f387f8b30e2b404efabe0cb65

    SHA256

    982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53

    SHA512

    9d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a

  • memory/2964-8-0x0000000010000000-0x000000001013F000-memory.dmp

    Filesize

    1.2MB

  • memory/2964-9-0x0000000010000000-0x000000001013F000-memory.dmp

    Filesize

    1.2MB

  • memory/2964-5-0x0000000010000000-0x000000001013F000-memory.dmp

    Filesize

    1.2MB

  • memory/2964-10-0x0000000000400000-0x0000000001404000-memory.dmp

    Filesize

    16.0MB

  • memory/2964-11-0x0000000000400000-0x0000000001404000-memory.dmp

    Filesize

    16.0MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.