Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 01:55

General

  • Target

    0accfa1744a5eba1cff2a8c8f5769eeb.exe

  • Size

    50KB

  • MD5

    0accfa1744a5eba1cff2a8c8f5769eeb

  • SHA1

    46138b6588b92b86a6299443e2fb61eb972ca695

  • SHA256

    3487e8511c01c1858935a5bbd1a7bd7b903e1e339696fa5c1705b5c2175814e9

  • SHA512

    d9c6e7b639e8dbe61a66d22450fdf320f4c6910103d145852ea9779daf1a731ceb1c9ba9785b18d9b337b91835e9398c77a1298c5e4ec8862014b8cfa3928511

  • SSDEEP

    1536:3vQ5F+U+337lxJpKE5gJLcxB3pwEidGkq5:345kU+Zpz54wtOEmNq5

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0accfa1744a5eba1cff2a8c8f5769eeb.exe
    "C:\Users\Admin\AppData\Local\Temp\0accfa1744a5eba1cff2a8c8f5769eeb.exe"
    1⤵
      PID:2636

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2636-0-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/2636-1-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB