Analysis

  • max time kernel
    233s
  • max time network
    335s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 09:12

General

  • Target

    ac48ebaaf83551a9130c1b3e61ce99075395b74f93cb33b0902708bd88971381.exe

  • Size

    369KB

  • MD5

    a59db46fda70f8f7f2b2a5e01cd98814

  • SHA1

    08a1bd20909263d422642622b6ee3fa7f07e10b5

  • SHA256

    ac48ebaaf83551a9130c1b3e61ce99075395b74f93cb33b0902708bd88971381

  • SHA512

    dd5461ce4a44a16887cef5f5b306aa73a081c90faa99079ed3b5169563952df1db8d2f780622a0154e1d3c50318f904c4898f2346e1c1e894f67184605cf5ee6

  • SSDEEP

    6144:tB6C1Cock3X5pVYBvP/o7B6jp3SgE/YqUNr8ilN6n8mRtyXfJ8LzcY5UtXC4TSZz:JPck3X56PwFYS9/XUNr8UQRG8fpeXUiS

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac48ebaaf83551a9130c1b3e61ce99075395b74f93cb33b0902708bd88971381.exe
    "C:\Users\Admin\AppData\Local\Temp\ac48ebaaf83551a9130c1b3e61ce99075395b74f93cb33b0902708bd88971381.exe"
    1⤵
      PID:472

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/472-54-0x0000000074FA1000-0x0000000074FA3000-memory.dmp

      Filesize

      8KB

    • memory/472-55-0x0000000000400000-0x000000000040D000-memory.dmp

      Filesize

      52KB