Analysis

  • max time kernel
    131s
  • max time network
    137s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    09-11-2020 12:51

General

  • Target

    fe5a36b3393bed4bec26a4738d9ab01b593d320f8fdb316c6787313d2778ca00.exe

  • Size

    13.4MB

  • MD5

    d0907740678802d7b10c4a547b665060

  • SHA1

    ed49f0e6b66abd858085fb7d4305169aaaefd8d5

  • SHA256

    fe5a36b3393bed4bec26a4738d9ab01b593d320f8fdb316c6787313d2778ca00

  • SHA512

    b62b4b21b9a4a03177b5e170b6b37a5e2187265823a4b4be0062cb7e925bd3690746da3f0bd6ac8cb5baac4393f0c8001bbd7f67fb386fff265e65df0af98b67

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe5a36b3393bed4bec26a4738d9ab01b593d320f8fdb316c6787313d2778ca00.exe
    "C:\Users\Admin\AppData\Local\Temp\fe5a36b3393bed4bec26a4738d9ab01b593d320f8fdb316c6787313d2778ca00.exe"
    1⤵
      PID:2208

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2208-0-0x0000000000400000-0x00000000010B8000-memory.dmp

      Filesize

      12.7MB