Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 12:29

General

  • Target

    188d49782e59517d1b53f62103a70d77.exe

  • Size

    1.8MB

  • MD5

    188d49782e59517d1b53f62103a70d77

  • SHA1

    ba209fdad66cf146f571bc62e449442d6b724c0f

  • SHA256

    4c15a6c5e8b0bd0f962f768da0ceafcba07d82c9a6a40504e3f2339f2a09358c

  • SHA512

    5c6e0c5b078b187a7f0dcc074bf1679cf800875b7a10700c1cb158fda8bedeb4f1543b9ce659a8a96ddb0df2961336bc698e8609a306b17aceb98915d7fbfa4d

  • SSDEEP

    24576:S6pQPxQ2JyP2r5mJV91xM7RpbwgIvs7NxqP:SCqm2Jpr0nNM7Dus7NxS

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\188d49782e59517d1b53f62103a70d77.exe
    "C:\Users\Admin\AppData\Local\Temp\188d49782e59517d1b53f62103a70d77.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    PID:2460

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2460-0-0x0000000000400000-0x00000000005BA000-memory.dmp

    Filesize

    1.7MB

  • memory/2460-5909-0x0000000000400000-0x00000000005BA000-memory.dmp

    Filesize

    1.7MB

  • memory/2460-13397-0x0000000000400000-0x00000000005BA000-memory.dmp

    Filesize

    1.7MB