Analysis

  • max time kernel
    143s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 10:03

General

  • Target

    65cc59738a29c2dea62e72918803cb15.exe

  • Size

    17KB

  • MD5

    65cc59738a29c2dea62e72918803cb15

  • SHA1

    310dd91d23819d3fd8400f48fe8973854135f314

  • SHA256

    8f7237f88d9650b8995f095401e560bf273693cd545b46db8c9626a4f9cc9b8d

  • SHA512

    f4050e7ebef97ec31f1c691a0aa257ac0316ec047813a44af7367134ec7d0bd84bad53ccf8e51061dcb5d4c76608572d2db5216cfae3d184eb1bf63c76a989e0

  • SSDEEP

    384:QZa57gEM/lhlWyaZ8ADqpV6vcuMdvwY7+91SutMd/mZ:Ua7UtWFRq2vUvo9cutMdu

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\65cc59738a29c2dea62e72918803cb15.exe
    "C:\Users\Admin\AppData\Local\Temp\65cc59738a29c2dea62e72918803cb15.exe"
    1⤵
      PID:5116

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/5116-1-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/5116-0-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB