Analysis

  • max time kernel
    14s
  • max time network
    99s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    10-11-2020 06:43

General

  • Target

    25a9c01a94382b1fb6f75703f48840d2fe85e6595d141f03b5bb7b880fc23a6b.exe

  • Size

    4.7MB

  • MD5

    d0332697498873a2b5d0fbdedd1f81c4

  • SHA1

    60facface35264502efe1207d79e689de21607c5

  • SHA256

    25a9c01a94382b1fb6f75703f48840d2fe85e6595d141f03b5bb7b880fc23a6b

  • SHA512

    0141c2e26de05e858e2e758e8ab923692097073c2de95cd2283800069859f58a3426c728fc313075be2faf2d304665d39a2ef18eea57da6b4fafc68600c498ca

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\25a9c01a94382b1fb6f75703f48840d2fe85e6595d141f03b5bb7b880fc23a6b.exe
    "C:\Users\Admin\AppData\Local\Temp\25a9c01a94382b1fb6f75703f48840d2fe85e6595d141f03b5bb7b880fc23a6b.exe"
    1⤵
      PID:1172

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1172-0-0x0000000000400000-0x00000000010B6000-memory.dmp

      Filesize

      12.7MB

    • memory/1172-1-0x0000000000400000-0x00000000010B6000-memory.dmp

      Filesize

      12.7MB