Analysis

  • max time kernel
    286s
  • max time network
    330s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 11:19

General

  • Target

    f5b72dc94d23e3753fa9975b6f12a9a722a8fef85a701c5114806d9b5ad900be.exe

  • Size

    61KB

  • MD5

    7258009454717972c31d40db41cd746e

  • SHA1

    2fb421c94f52db70df3b2d1a9b9d045b2af3738a

  • SHA256

    f5b72dc94d23e3753fa9975b6f12a9a722a8fef85a701c5114806d9b5ad900be

  • SHA512

    20af91d7bce11d7ffc3749642990663d770cb9f7ba558ca8a2ddb7845240411f706102d5d63f501960b1d13ed5e3d9582885f177ce664eff78fc3d58a51ad1d9

  • SSDEEP

    1536:J8XpGcHTMM5VYJH0VxOlhCCtcJpfq6OJ98cAuTpvEdq:aPF5UQxOhCCtcJpfq6OJBTp

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5b72dc94d23e3753fa9975b6f12a9a722a8fef85a701c5114806d9b5ad900be.exe
    "C:\Users\Admin\AppData\Local\Temp\f5b72dc94d23e3753fa9975b6f12a9a722a8fef85a701c5114806d9b5ad900be.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4268

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4268-132-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB