Analysis

  • max time kernel
    137s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2023 15:35

General

  • Target

    509a18f6dc87132e583017a82a64d2bb.exe

  • Size

    15KB

  • MD5

    509a18f6dc87132e583017a82a64d2bb

  • SHA1

    c9f0f472ce2eb7279a62e2571e54be791deea448

  • SHA256

    df268e7b20370c985e01bbaada62325d7a9488642281ed6348e7d5e26237e722

  • SHA512

    def5637342005595bcf1b106026d5bbaf800a8ffdcbe83e80143ff991df9872a295df50dbea3db399f0d3277ccab26ea44534c7ff554e83727774f4bc904eaf9

  • SSDEEP

    384:fo9q5pG7Vbjz0QhuvmtSh/6kTMklKBcdDtI7JliSwlmerfVjuujQA+CJwk:GqDSbP0w+mFko/B8I7JUSiVfVyLA+Kv

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: RenamesItself 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\509a18f6dc87132e583017a82a64d2bb.exe
    "C:\Users\Admin\AppData\Local\Temp\509a18f6dc87132e583017a82a64d2bb.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    PID:400

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/400-0-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/400-2-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB