Analysis

  • max time kernel
    62s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 21:22

General

  • Target

    b87df0e2e93b836b2aaa7a0993a383bfcfa9b59d7651141ba9152a020bae469c.exe

  • Size

    58KB

  • MD5

    48ce216313e9584ab2899e68b039c020

  • SHA1

    68583f43e4e89acac21d36b8d33949a02d29920a

  • SHA256

    b87df0e2e93b836b2aaa7a0993a383bfcfa9b59d7651141ba9152a020bae469c

  • SHA512

    071fa7cae594a25cdf1f0e48df262f080a02b26358d8b550d89d00b46a2b7baa6bc5145648613e92f0207fc8c61a88f973d8a357ec45b9da5c8cc7c528154939

  • SSDEEP

    1536:tHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6XJJzVtLk:tHoLde/OgV432UcP39hXJZn4

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b87df0e2e93b836b2aaa7a0993a383bfcfa9b59d7651141ba9152a020bae469c.exe
    "C:\Users\Admin\AppData\Local\Temp\b87df0e2e93b836b2aaa7a0993a383bfcfa9b59d7651141ba9152a020bae469c.exe"
    1⤵
    • Drops file in Windows directory
    PID:3736

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3736-132-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3736-133-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB