Analysis

  • max time kernel
    118s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-10-2022 17:26

General

  • Target

    f44b559b1d39d4be9b9fe6c8713c4b6fa54aaa18e30d01937fbe8e351c6193b6.exe

  • Size

    160KB

  • MD5

    a165c5dd1490fae75449bdb30d6d6d60

  • SHA1

    2521d572c066b81cf09324a4f5739d0d335b8f06

  • SHA256

    f44b559b1d39d4be9b9fe6c8713c4b6fa54aaa18e30d01937fbe8e351c6193b6

  • SHA512

    dd9c7034294e6a15560af331d77758051c176ab6876642e099579a3c86cd153f9991d874871338fa6152974266bff878fb28688aabf63bbd3a3d577e3da17ea2

  • SSDEEP

    3072:yxTqpdA3f6QNf2IPO4DpmWpAsfYbTOBoefYi6a9k20tAvnkzkuI2TX:02pdqfv2IPOGfXf5ovWvakO

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f44b559b1d39d4be9b9fe6c8713c4b6fa54aaa18e30d01937fbe8e351c6193b6.exe
    "C:\Users\Admin\AppData\Local\Temp\f44b559b1d39d4be9b9fe6c8713c4b6fa54aaa18e30d01937fbe8e351c6193b6.exe"
    1⤵
    • Drops file in Windows directory
    PID:4648

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4648-132-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4648-133-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB