Analysis

  • max time kernel
    91s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2022, 20:59

General

  • Target

    09c6ab217884a591cff45d16149feb0650345eeda5a101a65132a3f098cc658a.exe

  • Size

    63KB

  • MD5

    a37400c43587a560a181f8a61686c630

  • SHA1

    ea79a6b0daea2078608ea9281fe7ef47070fdb4c

  • SHA256

    09c6ab217884a591cff45d16149feb0650345eeda5a101a65132a3f098cc658a

  • SHA512

    f659c5383bd3f8db32fbb5d156d013b5933ee3c45a25eb801c654a6c9ccfc4d77430006476c51534ed6ae9601ae4b583982b1a24cc29dbd6e1757d5904ecb395

  • SSDEEP

    1536:KHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6k2L5baULn:KHoLde/OgV432UcP39hvF+8n

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09c6ab217884a591cff45d16149feb0650345eeda5a101a65132a3f098cc658a.exe
    "C:\Users\Admin\AppData\Local\Temp\09c6ab217884a591cff45d16149feb0650345eeda5a101a65132a3f098cc658a.exe"
    1⤵
    • Drops file in Windows directory
    PID:4956

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4956-132-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB