Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2023 02:51

General

  • Target

    2533fc950e961796b532590059349138.exe

  • Size

    98KB

  • MD5

    2533fc950e961796b532590059349138

  • SHA1

    9a69dc75b33e7dcb6e6ace9ee6b8035d9dec5cea

  • SHA256

    e7c5f5014337e0807f12936dcd0a6356d05f21e934dcfcab9810f57fbcb8fc92

  • SHA512

    da01c9346fd69e7e94a7da2c9fc27a6b2602549f178da2cf2086a1640e80c4bba1fccf6ac06627f1b04990346e4fce72ea451db8905bc4d2d2ec1976e38c6fd4

  • SSDEEP

    1536:xTRZucareR56rISMYboNrTC26oFi6FdMDeV/Mfneo8akzLnouy8pClt0:xrucF5wDjbodWPog6FWqKeoBiToutp2

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2533fc950e961796b532590059349138.exe
    "C:\Users\Admin\AppData\Local\Temp\2533fc950e961796b532590059349138.exe"
    1⤵
      PID:3952

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3952-0-0x0000000000400000-0x0000000000460000-memory.dmp

      Filesize

      384KB

    • memory/3952-1-0x0000000000E10000-0x0000000000E11000-memory.dmp

      Filesize

      4KB

    • memory/3952-2-0x0000000000400000-0x0000000000460000-memory.dmp

      Filesize

      384KB