Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-05-2023 12:23

General

  • Target

    tmp.exe

  • Size

    188KB

  • MD5

    9da98b512a2008c5274db8c306711437

  • SHA1

    182b3c1b852a77962ced6f59b6059d9e1aff3c33

  • SHA256

    41f27ba09ed6da93a3c7487a4c088dacb1ef49a032973a72b18fb34cd8846301

  • SHA512

    0d361a845a9b8ac08cf2df93331e889d426eb8f907a9da1b47bed5d11535b20cdec7279830f0de84596fb85ea370f0ae3538882681bbf9a0ff3b54ab1e27c86e

  • SSDEEP

    3072:Doyu3v2CHzwvK+cL+7USBT9v5Hy/YHhm8d6GelcTM6XtwQ27aBfdsemLyKJ:Vcv2Q9+cq7XTp9d6GG6XIMfyeoyS

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
      PID:2072

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2072-133-0x0000000000400000-0x000000000048B000-memory.dmp

      Filesize

      556KB