Analysis

  • max time kernel
    46s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 21:16

General

  • Target

    cfa57426c4f16cebf2d39b228e25f704946dc5766e3de7f58df72a8157573962.exe

  • Size

    4KB

  • MD5

    6e1afa2bd66321f25dd5d8ecff2a0ab0

  • SHA1

    9a5213dd27f4146db48020ab85a121f75d889d1a

  • SHA256

    cfa57426c4f16cebf2d39b228e25f704946dc5766e3de7f58df72a8157573962

  • SHA512

    706960314f09f6eacc1688463a75d4fb45c39b21eff6e1afdd1047fae4cd81172cf588aa9ac46219dbc080d3c521fbbcd0a25982fcd52bb27c8796d1e54e2fd5

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cfa57426c4f16cebf2d39b228e25f704946dc5766e3de7f58df72a8157573962.exe
    "C:\Users\Admin\AppData\Local\Temp\cfa57426c4f16cebf2d39b228e25f704946dc5766e3de7f58df72a8157573962.exe"
    1⤵
      PID:1672

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1672-54-0x0000000000400000-0x0000000000407000-memory.dmp

            Filesize

            28KB