Analysis

  • max time kernel
    235s
  • max time network
    337s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 14:46

General

  • Target

    c3fa15dc72ffab219fc0ec86b5d671823345212fce444fe39a71747c0e9aa35e.exe

  • Size

    57KB

  • MD5

    c5cdff39c497ebc109a15c81ba3dc386

  • SHA1

    2334319a980c98155eedfbbbd40d0a86a1d9824d

  • SHA256

    c3fa15dc72ffab219fc0ec86b5d671823345212fce444fe39a71747c0e9aa35e

  • SHA512

    cd7560148fe3e6f59848ac6ef390a848b7c106ba6ec7e576d890eec0240e11a6a8e3a7c87c77696e2566bf27d26476aa9a4d0f2d74a216e8d720d2ed0bde2f9f

  • SSDEEP

    1536:tHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6XJJzVtn:tHoLde/OgV432UcP39hXJZnn

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3fa15dc72ffab219fc0ec86b5d671823345212fce444fe39a71747c0e9aa35e.exe
    "C:\Users\Admin\AppData\Local\Temp\c3fa15dc72ffab219fc0ec86b5d671823345212fce444fe39a71747c0e9aa35e.exe"
    1⤵
    • Drops file in Windows directory
    PID:268

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/268-54-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/268-55-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/268-56-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB