Analysis

  • max time kernel
    14s
  • max time network
    17s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2022, 07:28 UTC

General

  • Target

    8da67f091d33e1da8d1fd2f7c41de39b01953ecd04c542ac73bde2f8f5065b69.exe

  • Size

    70KB

  • MD5

    05971a4b875e79ecbf9e08f797775213

  • SHA1

    0fec48d134de549fdb979651ed6e58a2c6d592de

  • SHA256

    8da67f091d33e1da8d1fd2f7c41de39b01953ecd04c542ac73bde2f8f5065b69

  • SHA512

    8c6200b0d0ca60e714c5c1f0120b74978a2b65765d2e93234a6a4908d1b3c93918868cd0977a928421ef202c99c6944a3179da71e90bc18423fda411d5e32802

  • SSDEEP

    1536:tHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6XJJzVtWc++gxEWucHmRI5:tHoLde/OgV432UcP39hXJZnWcPr3jRI5

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8da67f091d33e1da8d1fd2f7c41de39b01953ecd04c542ac73bde2f8f5065b69.exe
    "C:\Users\Admin\AppData\Local\Temp\8da67f091d33e1da8d1fd2f7c41de39b01953ecd04c542ac73bde2f8f5065b69.exe"
    1⤵
    • Drops file in Windows directory
    PID:2732

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2732-132-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2732-133-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.