Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 03:11

General

  • Target

    25e06d44938c60d8d52118012f67f468.exe

  • Size

    19KB

  • MD5

    25e06d44938c60d8d52118012f67f468

  • SHA1

    37c60bcb7efecd794147ae52d7a6844e1c701541

  • SHA256

    a6dd2413409809b9c096a581d2089e6fd7d57fed442c7a9e6f1dfe092dc3a4c8

  • SHA512

    08c4d521807021f50cf7b95d1412e7c7199309c4fcb50f9b3c6c743b3a49ecba17380be19be5826c07441ff341b0696a454f245964dc86fde76fe2c7f76a67a5

  • SSDEEP

    384:WGIaZMBmWfPq8vSeQMUNBuDSQD7alQBKgGwj9ttBO8vwRpcod:WGFZMtweQEauQgj9ttBnvqpcw

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\25e06d44938c60d8d52118012f67f468.exe
    "C:\Users\Admin\AppData\Local\Temp\25e06d44938c60d8d52118012f67f468.exe"
    1⤵
      PID:776

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/776-0-0x0000000000400000-0x0000000000410000-memory.dmp

            Filesize

            64KB

          • memory/776-1-0x0000000000270000-0x0000000000272000-memory.dmp

            Filesize

            8KB

          • memory/776-2-0x0000000000280000-0x0000000000281000-memory.dmp

            Filesize

            4KB

          • memory/776-3-0x0000000000400000-0x0000000000410000-memory.dmp

            Filesize

            64KB

          • memory/776-4-0x0000000000400000-0x0000000000410000-memory.dmp

            Filesize

            64KB