Analysis

  • max time kernel
    154s
  • max time network
    178s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2022, 07:32

General

  • Target

    16014de0600d800ef521d35f9539ddfe6a9f919119ce484a07b02628e470e2b3.exe

  • Size

    57KB

  • MD5

    0f0b93319d7e18c6b97ad717aa251cb0

  • SHA1

    7a429d77f641c5b7fdd7c548c61b6c7ccc94b998

  • SHA256

    16014de0600d800ef521d35f9539ddfe6a9f919119ce484a07b02628e470e2b3

  • SHA512

    804594711465d17035a4257b4701453fb316e34d6462a5210ae26cc28c1cd15071a4374bd857a5474991e713a6cadacba57ad46253190378db104fefbae7cb54

  • SSDEEP

    1536:tHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6XJJzVtKj:tHoLde/OgV432UcP39hXJZnu

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16014de0600d800ef521d35f9539ddfe6a9f919119ce484a07b02628e470e2b3.exe
    "C:\Users\Admin\AppData\Local\Temp\16014de0600d800ef521d35f9539ddfe6a9f919119ce484a07b02628e470e2b3.exe"
    1⤵
    • Drops file in Windows directory
    PID:2240

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2240-132-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2240-133-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB