Analysis

  • max time kernel
    182s
  • max time network
    197s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2022 02:00

General

  • Target

    919cf528a02ad2608902a2169254c02200f43f9ea3f10ec715e1a58dd07e54a5.exe

  • Size

    88KB

  • MD5

    bdbe6f4b40e6e5f30ecc434d89a8bd01

  • SHA1

    85e29f9aeb11019531f9ffd79dc91348db44692c

  • SHA256

    919cf528a02ad2608902a2169254c02200f43f9ea3f10ec715e1a58dd07e54a5

  • SHA512

    a0d630722a2541c0d098901f0d6cb82e05b96dabbb7d1de246d5c80aef7370ca45bd77c3341df81c33b617a9ebcbaaacd745167c204c4a7fe7967411dd67d27f

  • SSDEEP

    1536:Mckxsaxcxk6pLD4z7bBaf3BW5kin66YuOs:MJ9ML8kW5k+ZROs

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\919cf528a02ad2608902a2169254c02200f43f9ea3f10ec715e1a58dd07e54a5.exe
    "C:\Users\Admin\AppData\Local\Temp\919cf528a02ad2608902a2169254c02200f43f9ea3f10ec715e1a58dd07e54a5.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:5112

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5112-132-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/5112-133-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB