Analysis

  • max time kernel
    147s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 00:29

General

  • Target

    1cf7c3e7b970d052efa6c884198cbd94.exe

  • Size

    278KB

  • MD5

    1cf7c3e7b970d052efa6c884198cbd94

  • SHA1

    3a94564387417a56049701a60c6df067e811bd61

  • SHA256

    e342dc2da4f66c4f45cf8d8063e6b4a6cd6033e819ce3a4ca18289122a3f031f

  • SHA512

    68f90a8310c23a35f77d27a21d999783ac7055b2a820b4a2f9ad2911a4010d3a06377995dcebf1dc71c88ef1fb131efc47fd9c3a791299b43e3de4b4c5c0442f

  • SSDEEP

    6144:zm8IQfnnxHSuHT4FZGHrCUR9bPxKSUE9r/kg8omRH:zm8zfnIJFdURVrMg+RH

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1cf7c3e7b970d052efa6c884198cbd94.exe
    "C:\Users\Admin\AppData\Local\Temp\1cf7c3e7b970d052efa6c884198cbd94.exe"
    1⤵
      PID:4332

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4332-0-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/4332-1-0x0000000000AB0000-0x0000000000AB1000-memory.dmp

      Filesize

      4KB

    • memory/4332-2-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/4332-4-0x0000000000AB0000-0x0000000000AB1000-memory.dmp

      Filesize

      4KB

    • memory/4332-9-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/4332-11-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB