Analysis

  • max time kernel
    153s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/10/2022, 12:47

General

  • Target

    ac5f445cc820b6bc512c3e9d0cf96e1699200366a49c72795b6e4ccb5c9fdac4.exe

  • Size

    4KB

  • MD5

    a169621fffabfc9c7861d638e0349670

  • SHA1

    0b7092f8140db3fdaf64a4ac27dafaccda45b8cd

  • SHA256

    ac5f445cc820b6bc512c3e9d0cf96e1699200366a49c72795b6e4ccb5c9fdac4

  • SHA512

    9d7d86f1f15f4a2fadeda23345fa528040691d47d438dd23770573f134833fa78489511019cd48a5294890b0517449df5fa90552316e231a5ee3cd62ed031423

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac5f445cc820b6bc512c3e9d0cf96e1699200366a49c72795b6e4ccb5c9fdac4.exe
    "C:\Users\Admin\AppData\Local\Temp\ac5f445cc820b6bc512c3e9d0cf96e1699200366a49c72795b6e4ccb5c9fdac4.exe"
    1⤵
      PID:1920

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1920-132-0x0000000000400000-0x0000000000407000-memory.dmp

            Filesize

            28KB

          • memory/1920-133-0x0000000000400000-0x0000000000407000-memory.dmp

            Filesize

            28KB