Analysis

  • max time kernel
    152s
  • max time network
    180s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-10-2022 21:19

General

  • Target

    83f92bf68ccb3243541b4d79b6f5a1cf594aaf652d8dcc23924ca7010e2309d0.exe

  • Size

    4KB

  • MD5

    5ddc847b4874238db5d8425d42d3c160

  • SHA1

    9a62d5b73a3aedcbf7ed9f19ef7c737ec564b56e

  • SHA256

    83f92bf68ccb3243541b4d79b6f5a1cf594aaf652d8dcc23924ca7010e2309d0

  • SHA512

    9be6186c89b1d74d011a4506ba0dbcaf4798e1b6896056e0b0857370a099ce3ab9937002308770607f82205d9de4d8514ba89e0aa82f6625dd05802d7d2df735

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\83f92bf68ccb3243541b4d79b6f5a1cf594aaf652d8dcc23924ca7010e2309d0.exe
    "C:\Users\Admin\AppData\Local\Temp\83f92bf68ccb3243541b4d79b6f5a1cf594aaf652d8dcc23924ca7010e2309d0.exe"
    1⤵
      PID:4120

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4120-132-0x0000000000400000-0x0000000000407000-memory.dmp

      Filesize

      28KB