Analysis

  • max time kernel
    139s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2022, 23:46

General

  • Target

    218e7e4bab8a1c9fe457b47258897241b394d7075ae5faa77f8a3040f0b927bb.exe

  • Size

    68KB

  • MD5

    4cc56d835e8233b68b6e6a2d6adf8642

  • SHA1

    fc1681d78048d84d7f76bcffd7137543a8025f73

  • SHA256

    218e7e4bab8a1c9fe457b47258897241b394d7075ae5faa77f8a3040f0b927bb

  • SHA512

    3a789cc3fd23179c1090477f8f42b5c53f663611082ead8d72b8eada4b9a8d31cdadce73c6ebcb4ae3674fed30b77de3fc5d8dbb01d2299976f40f524fb9d260

  • SSDEEP

    1536:tHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6XJJzVtWc++EBZw:tHoLde/OgV432UcP39hXJZnWcPki

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\218e7e4bab8a1c9fe457b47258897241b394d7075ae5faa77f8a3040f0b927bb.exe
    "C:\Users\Admin\AppData\Local\Temp\218e7e4bab8a1c9fe457b47258897241b394d7075ae5faa77f8a3040f0b927bb.exe"
    1⤵
    • Drops file in Windows directory
    PID:4100

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4100-132-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB