Analysis

  • max time kernel
    90s
  • max time network
    92s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    15-11-2020 22:46

General

  • Target

    7a4bfd551b2eb99868d2ece95504a2a36d4839f9061c72e939877d8f1a18a5cb.exe

  • Size

    4.2MB

  • MD5

    001dea7a3c069e655cb0460c6abdb7b2

  • SHA1

    88a439fb5d18d193d9c7b633b696201a120a98cb

  • SHA256

    7a4bfd551b2eb99868d2ece95504a2a36d4839f9061c72e939877d8f1a18a5cb

  • SHA512

    55fa522da73b2668eaeb3051fa0b27150de0a024dce65409b14678143565cab4775aebd7043d6107eddeef8a8d0b8c914e5d09d53eb153d69715006fc994ff2c

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a4bfd551b2eb99868d2ece95504a2a36d4839f9061c72e939877d8f1a18a5cb.exe
    "C:\Users\Admin\AppData\Local\Temp\7a4bfd551b2eb99868d2ece95504a2a36d4839f9061c72e939877d8f1a18a5cb.exe"
    1⤵
      PID:1400

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1400-0-0x0000000000400000-0x00000000010B6000-memory.dmp
      Filesize

      12.7MB

    • memory/1400-1-0x0000000000400000-0x00000000010B6000-memory.dmp
      Filesize

      12.7MB