Analysis

  • max time kernel
    143s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 12:53

General

  • Target

    1ffc73ab9beeb376deb1f6fd622e08d8.exe

  • Size

    29KB

  • MD5

    1ffc73ab9beeb376deb1f6fd622e08d8

  • SHA1

    f19940a76a43da63baa3bf76b69fb510e5ac64cf

  • SHA256

    f851b37fe0c82503c2463a88c0943e5f43ecf7a00787fcf03ee447667349a0d8

  • SHA512

    13e620194dfb93749b690bfef796cff4cb97efea3bb1e8f84e22315a234c4e4a99061d379621583b0cbee4ba4e689056931a6b331097321729c58ea33386afd8

  • SSDEEP

    768:V/ucetyx9x7M33r1ZJECJf3erMO5AhWt6Se8LnF:Retcz7M3b5LfyMO2A6S9F

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ffc73ab9beeb376deb1f6fd622e08d8.exe
    "C:\Users\Admin\AppData\Local\Temp\1ffc73ab9beeb376deb1f6fd622e08d8.exe"
    1⤵
      PID:2588

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2588-0-0x0000000000400000-0x0000000000418000-memory.dmp

      Filesize

      96KB

    • memory/2588-1-0x00000000004C0000-0x00000000004CA000-memory.dmp

      Filesize

      40KB

    • memory/2588-3-0x0000000000400000-0x0000000000418000-memory.dmp

      Filesize

      96KB

    • memory/2588-2-0x00000000004E0000-0x00000000004E1000-memory.dmp

      Filesize

      4KB

    • memory/2588-4-0x0000000000400000-0x0000000000418000-memory.dmp

      Filesize

      96KB