Analysis

  • max time kernel
    40s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19-10-2022 18:28

General

  • Target

    6d2e26633168013619122f10dd17b65d44bb81436f633a5b05b5198d720243ea.exe

  • Size

    65KB

  • MD5

    a1a88299fe82ae62b3a123754d2e7930

  • SHA1

    ab7548b6dd10128d2bf86693adce03d4c95096b3

  • SHA256

    6d2e26633168013619122f10dd17b65d44bb81436f633a5b05b5198d720243ea

  • SHA512

    99b69cf6132cc9fcd1e3060548307f34b3df257089a258589f6a28640423f461d5173a54ccb5bfc2c9a3d84f5d1251ab2f2d28408681b567e2072f1ef9fecff9

  • SSDEEP

    1536:tHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6XJJzVtWc++5+:tHoLde/OgV432UcP39hXJZnWcP5+

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d2e26633168013619122f10dd17b65d44bb81436f633a5b05b5198d720243ea.exe
    "C:\Users\Admin\AppData\Local\Temp\6d2e26633168013619122f10dd17b65d44bb81436f633a5b05b5198d720243ea.exe"
    1⤵
    • Drops file in Windows directory
    PID:1792

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1792-54-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB