Analysis

  • max time kernel
    41s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2022 20:15

General

  • Target

    11c52275674fc0e46d9b0bc457325c3078c1456eb8d318c2f3a8749622c34cc4.exe

  • Size

    988KB

  • MD5

    01929dc6a6c275ad014cc8b40f4c7878

  • SHA1

    d6f1f9a3ece3fa0d00b4d763a58c77de7e9fdb3c

  • SHA256

    11c52275674fc0e46d9b0bc457325c3078c1456eb8d318c2f3a8749622c34cc4

  • SHA512

    558c1833fbac3e4176275707eaba13e2e2a4022ee8f00817b502d0f3d7bd475bf3573b60672173361b9140b8959dc0531691e4525347998790ac5580fde8f03e

  • SSDEEP

    12288:ayELQDEI04EAihYHfXNc3pW0MIVABevVn9b2tvrra:7ELQpY0c3pW0P6Be9nMt

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file ⋅ 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\11c52275674fc0e46d9b0bc457325c3078c1456eb8d318c2f3a8749622c34cc4.exe
    "C:\Users\Admin\AppData\Local\Temp\11c52275674fc0e46d9b0bc457325c3078c1456eb8d318c2f3a8749622c34cc4.exe"
    PID:1948

Network

MITRE ATT&CK Matrix

Collection

    Command and Control

      Credential Access

        Defense Evasion

          Discovery

            Execution

              Exfiltration

                Impact

                  Initial Access

                    Lateral Movement

                      Persistence

                        Privilege Escalation

                          Replay Monitor

                          00:00 00:00

                          Downloads

                          • memory/1948-54-0x0000000000400000-0x0000000000532000-memory.dmp