Analysis

  • max time kernel
    141s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 09:25

General

  • Target

    145d294684324321c0932b26b8145c98.exe

  • Size

    126KB

  • MD5

    145d294684324321c0932b26b8145c98

  • SHA1

    dd2c222e66d6e61d016b9183b118b592a733bbd2

  • SHA256

    e20a14230e279c8597270668e3ee619ca2d9709c383ba40f2003cdfa5d7fb573

  • SHA512

    4bc8a129d5bd6e11e710c97245e2b621e9f836659ff1add7d9e0e873f32dccddd1903c26a0014241f60e16fe8bd98a84bc60e15cf55d96f9879d57e1b5a9bfc7

  • SSDEEP

    3072:bQ+G2KwKxFpGrjj/JCAXa9nyi04BQgVF5BQhGh7c:blKwiFpGvjMAXwnDBzVF5BQho7

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\145d294684324321c0932b26b8145c98.exe
    "C:\Users\Admin\AppData\Local\Temp\145d294684324321c0932b26b8145c98.exe"
    1⤵
      PID:2036

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2036-0-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/2036-1-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB