Analysis

  • max time kernel
    199s
  • max time network
    224s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2023, 08:19

General

  • Target

    NEAS.ded07e7c94b8c8fad238c6176bef06c0.exe

  • Size

    29KB

  • MD5

    ded07e7c94b8c8fad238c6176bef06c0

  • SHA1

    a74f5d96125caaee67027c39e914b0ee3fed97c0

  • SHA256

    331eaa7455933c15423a57c3c5bdb037c254768eb0f91e4f64deb83add3ab317

  • SHA512

    6f1ae2db0c1a50163cbafdda53f52de408f15ffe10b228f9454566e693c7ea1624f179dad9a092e4f2228461cf3a27585dad540e7ddb669229db7b5a23fcc593

  • SSDEEP

    768:ITRfpN0pOy3OzeXmOGXbJOlB2vsLCik5dAy7b6lSii:IHzzeWHXbJGB2EOik5h36lk

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.ded07e7c94b8c8fad238c6176bef06c0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.ded07e7c94b8c8fad238c6176bef06c0.exe"
    1⤵
      PID:2172

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\My Downloads\Prisoner Of War Crack.exe

      Filesize

      29KB

      MD5

      0b72a401e8c6192172f36895e2c2ac49

      SHA1

      727533c31c0a5a9d0244d118c44574777aabe8c7

      SHA256

      fb2df715382b46a1e1e3ea847f34491252f17ca5b3e62dd29b6cf4e7c1dcee3b

      SHA512

      adf19f3e676a6f8da4f052626c8c483dcab51912b29385e4e87d3c7ef4a7fbf7fb2aa2b51226721d6f80b95ef34e5196c30cf55fb3d311ce7345da6a5d07e194

    • memory/2172-0-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/2172-1-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/2172-103-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB