Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 02:54

General

  • Target

    4e20676ee5b6e4fa636feb9a575f221b.exe

  • Size

    82KB

  • MD5

    4e20676ee5b6e4fa636feb9a575f221b

  • SHA1

    6fd8cde4f91e4a9b61540f5b3b0c3eba70392a25

  • SHA256

    e61cd6a5dd9119985c99300a97fa1ee153b292108bc2bd21ecff39e3cb0e95b2

  • SHA512

    8fd0d4f450df7dfa5a3e4deaff701c5aa8b3412d1ddedff1177e5dd2fcc915f600b5dcdc4df9d23eb41c15a730d976b5ca5082d4ee1dcf146caf86e61b64859e

  • SSDEEP

    1536:vC4Z4yp3hxqupqMhaNEJqd+I2BB8OyeXeQtv64chVqlajzxQ0r0:vC4Z4yp7qlkJqwN/yzQpbv0r0

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies registry class 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e20676ee5b6e4fa636feb9a575f221b.exe
    "C:\Users\Admin\AppData\Local\Temp\4e20676ee5b6e4fa636feb9a575f221b.exe"
    1⤵
    • Modifies registry class
    PID:3032

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3032-0-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/3032-1-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB