Analysis

  • max time kernel
    150s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 21:21

General

  • Target

    ccb54a195593db5fb6bb1848de80adb906fb33852d1a556bb702d850a70cba20.exe

  • Size

    58KB

  • MD5

    4457c3fe2a35ac59827bf333c0e16e10

  • SHA1

    11f8a242b271cb5fc088a1a7941c38c5bf7b0658

  • SHA256

    ccb54a195593db5fb6bb1848de80adb906fb33852d1a556bb702d850a70cba20

  • SHA512

    ce0a350c9497d51abc2bf315c8fb938550d8303b4920f23b76065a84404ead4b48360fbcc3b06a29f423c77d496e7923b445c7830834b93f3fa32f764347a74a

  • SSDEEP

    1536:tHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6XJJzVtF:tHoLde/OgV432UcP39hXJZnF

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ccb54a195593db5fb6bb1848de80adb906fb33852d1a556bb702d850a70cba20.exe
    "C:\Users\Admin\AppData\Local\Temp\ccb54a195593db5fb6bb1848de80adb906fb33852d1a556bb702d850a70cba20.exe"
    1⤵
    • Drops file in Windows directory
    PID:4844

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4844-132-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4844-133-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB