Analysis

  • max time kernel
    3s
  • max time network
    71s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 01:24

General

  • Target

    203ce13aef340bcffc45e12e45121142.exe

  • Size

    1.8MB

  • MD5

    203ce13aef340bcffc45e12e45121142

  • SHA1

    289196c59aaee11df4b0782a33752307c83ceefc

  • SHA256

    e3018860d8edc152a132609e5719066339af2480baf40a36ae21e54dab521adf

  • SHA512

    1eefd80ccfd39fe840191320b6355cba220dd626b06b30237f97fd963d4a8864ba31f2efc1c34db2c4c91b61b689d8b15027feda76160d036cbda8723ccf520f

  • SSDEEP

    24576:S6pQPxQ2JyP2r5mJV91xM7RpbwgIvs7NxqUkHG:SCqm2Jpr0nNM7Dus7Nx2m

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\203ce13aef340bcffc45e12e45121142.exe
    "C:\Users\Admin\AppData\Local\Temp\203ce13aef340bcffc45e12e45121142.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2236

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\7-zip32.dll

    Filesize

    92KB

    MD5

    94d0a59e3e1f8034cf928876b525b2e7

    SHA1

    30600a6adaa67b9869a92bdcd1fa14b38632e150

    SHA256

    ed4e1966cd563d7725bc4d87fc6c03e4f2c170a015dc364b4ab9dbe923de852c

    SHA512

    42d76e865408a314eac1a5158ec5b09058b07b0672ae4850e495ab029b40115e52037bd0248ddf546139aee00a78b442dbee2b5e56bf5653c42d45a5d64271bf

  • memory/2236-0-0x0000000000400000-0x00000000005BA000-memory.dmp

    Filesize

    1.7MB

  • memory/2236-5925-0x0000000000400000-0x00000000005BA000-memory.dmp

    Filesize

    1.7MB

  • memory/2236-13409-0x0000000000400000-0x00000000005BA000-memory.dmp

    Filesize

    1.7MB