Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 12:02

General

  • Target

    17df4324ceb16de5e66a78c3158461da.exe

  • Size

    30KB

  • MD5

    17df4324ceb16de5e66a78c3158461da

  • SHA1

    8b2836d7e4e01bbf2b0bd532bf35a84abae68d3a

  • SHA256

    20e945550a602325ed73dfab4e707068b94980374ed1dc0a1666dd8fbd624a92

  • SHA512

    76ff48b985a7006f1fd50beb5e60845bc4b2531f68bc87f0cff43e1f34ddcfcffe217db350e5d70e65335b68d1d6d89b794e6a7b9bef4354883f782cc8a65f49

  • SSDEEP

    768:monoxuDIO9uFbFx7MxmZEpPYYw1uGa7yu0:4fO6BsPY3u0

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\17df4324ceb16de5e66a78c3158461da.exe
    "C:\Users\Admin\AppData\Local\Temp\17df4324ceb16de5e66a78c3158461da.exe"
    1⤵
      PID:2148

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2148-0-0x0000000000400000-0x0000000000414000-memory.dmp

            Filesize

            80KB

          • memory/2148-1-0x0000000000400000-0x0000000000414000-memory.dmp

            Filesize

            80KB