Analysis

  • max time kernel
    16s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30-10-2022 09:11

General

  • Target

    535f8f356db4779e4a35afa924833f130ae9bc69495eb20c89154b02142f45aa.exe

  • Size

    63KB

  • MD5

    a29297832736223cb21526f6b71292d0

  • SHA1

    0236df13ccc4f3c54160c9134b2d054110e91a85

  • SHA256

    535f8f356db4779e4a35afa924833f130ae9bc69495eb20c89154b02142f45aa

  • SHA512

    b1f2d10488bf1c4d9a3d3fbb0bc86d9667bbeb94ba62fe351aed2af12dd10061a71b02d2a32abe317677f50a0d91c9a4e473218e1b67b71ab52f3313891d4a9b

  • SSDEEP

    1536:KHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6k2L5baULRt:KHoLde/OgV432UcP39hvF+8Rt

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\535f8f356db4779e4a35afa924833f130ae9bc69495eb20c89154b02142f45aa.exe
    "C:\Users\Admin\AppData\Local\Temp\535f8f356db4779e4a35afa924833f130ae9bc69495eb20c89154b02142f45aa.exe"
    1⤵
    • Drops file in Windows directory
    PID:1164

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1164-54-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB