Analysis

  • max time kernel
    148s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/12/2023, 16:01

General

  • Target

    e57463a875f6fd7aa2b9e972f077a2a2.exe

  • Size

    14KB

  • MD5

    e57463a875f6fd7aa2b9e972f077a2a2

  • SHA1

    53393358919a83b85bf282e2eb5341178e80f01a

  • SHA256

    6892efc08aac070743194dd0240e5c42f23075d4b971e387700719c963a52157

  • SHA512

    d38061407c7d929116db8e2480bb6e5462a993926176164efe89cc257576a854d12051823bce8718992f7a24ab459be70321cf7794e3d5c537d2980648355d26

  • SSDEEP

    384:fo9q5pG7Vbjz0QhuvmtSh/6kTMklKBcdDtI7JliSwlmerfVjuujQA+CJwd:GqDSbP0w+mFko/B8I7JUSiVfVyLA+Ky

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: RenamesItself 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e57463a875f6fd7aa2b9e972f077a2a2.exe
    "C:\Users\Admin\AppData\Local\Temp\e57463a875f6fd7aa2b9e972f077a2a2.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    PID:412

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/412-0-0x0000000000400000-0x000000000041A000-memory.dmp

          Filesize

          104KB

        • memory/412-2-0x0000000000400000-0x000000000041A000-memory.dmp

          Filesize

          104KB