Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 13:10

General

  • Target

    20bb9ddc66742f8c76b098f72c260d83.exe

  • Size

    40KB

  • MD5

    20bb9ddc66742f8c76b098f72c260d83

  • SHA1

    3329d136d076e65c7a57d47521b1c8ec4c5bf18a

  • SHA256

    e97d853dcd0623fb35bb728823b19e511e450fe96e0f03927ef0a2b2e0da3490

  • SHA512

    021558f776cc5fac8ebca0cac506d89a77599e9bc4ffffc199a3a9ddbff896523d40049ef426062dc35ab92a60f37728cd2ff49e8bd39d234859a970facb4abe

  • SSDEEP

    768:Kriyi+2kh07qXR3yipTK02AKy0b5K6Qjh6O/gFWMHfG:H3cxCiVF0b5K71PIP

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\20bb9ddc66742f8c76b098f72c260d83.exe
    "C:\Users\Admin\AppData\Local\Temp\20bb9ddc66742f8c76b098f72c260d83.exe"
    1⤵
      PID:4968

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4968-0-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4968-1-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB