Analysis

  • max time kernel
    178s
  • max time network
    189s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 20:44

General

  • Target

    c30690c8789b4fec9f28b47b629d9e6bf25625b9be775caface13df834131503.exe

  • Size

    22KB

  • MD5

    5252745040a58e682c9838696b7d9478

  • SHA1

    de059d27808d926b0433cdc195d6ef595e3e8936

  • SHA256

    c30690c8789b4fec9f28b47b629d9e6bf25625b9be775caface13df834131503

  • SHA512

    f14b76ae8ba4666fb39c686db0840f1054d55f855792d1fb9a7777cda9b59f9cc27b7efa687908464252028a04e15d5337909b9a24338f0d104885fe3e9593a6

  • SSDEEP

    192:PpMBl5jUmTOEeQ0SKTaD93pWlNOmH59pc/zwzWb:Pp09TO03olNB59pc/UzWb

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c30690c8789b4fec9f28b47b629d9e6bf25625b9be775caface13df834131503.exe
    "C:\Users\Admin\AppData\Local\Temp\c30690c8789b4fec9f28b47b629d9e6bf25625b9be775caface13df834131503.exe"
    1⤵
      PID:1568

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1568-132-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB