Analysis

  • max time kernel
    151s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/09/2022, 22:22

General

  • Target

    ae0d94d2e1d995d8f4c2b50e1e69d296d54915808e3ab20a7f334d9f6ec39274.exe

  • Size

    22KB

  • MD5

    7b5d3fabbcedf068673bb10cfed1668a

  • SHA1

    8299fe63e896024684f492086a734fd671f35a56

  • SHA256

    ae0d94d2e1d995d8f4c2b50e1e69d296d54915808e3ab20a7f334d9f6ec39274

  • SHA512

    1a968c1b72584312d7d86f93f67e00ff37689c83bd70c6c98c5096e2ed1de7373e28c043be6f7ba4a49cfbd9ed6121a00fd4b26957c54cc072011dcecff6b2b8

  • SSDEEP

    384:+oyCq5lR0KllSohLEf+G5sqJknMWfCVoHe5HXN94uOOX7UZwZ4UA9:o9BllSohwF5tyMtVoHe5HXLvjZNA

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae0d94d2e1d995d8f4c2b50e1e69d296d54915808e3ab20a7f334d9f6ec39274.exe
    "C:\Users\Admin\AppData\Local\Temp\ae0d94d2e1d995d8f4c2b50e1e69d296d54915808e3ab20a7f334d9f6ec39274.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    PID:4156

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4156-132-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB