Analysis

  • max time kernel
    34s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 07:25

General

  • Target

    db90abb920da8b1cb08ff7aa7c1d5c2556d9d4eb1465a0ce5d88e4fb934c8193.exe

  • Size

    58KB

  • MD5

    7cfad27e47d48fcb91f2eab4127e1e10

  • SHA1

    16157153f4fa7d78987189b66e071708d3ab17a3

  • SHA256

    db90abb920da8b1cb08ff7aa7c1d5c2556d9d4eb1465a0ce5d88e4fb934c8193

  • SHA512

    fc2eb6e2f095fc636bba984b18b17a4f8f18e0f937136c270471e3b66e7c5935defcf016fb88764989b16ac80d13be25de84bac413a3b7a59aa2f704d34d7b12

  • SSDEEP

    1536:tHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6XJJzVtWcIVv:tHoLde/OgV432UcP39hXJZnWNVv

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db90abb920da8b1cb08ff7aa7c1d5c2556d9d4eb1465a0ce5d88e4fb934c8193.exe
    "C:\Users\Admin\AppData\Local\Temp\db90abb920da8b1cb08ff7aa7c1d5c2556d9d4eb1465a0ce5d88e4fb934c8193.exe"
    1⤵
    • Drops file in Windows directory
    PID:1416

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1416-54-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB