Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 04:05

General

  • Target

    276e74e85741aa741019f35d92110839.exe

  • Size

    277KB

  • MD5

    276e74e85741aa741019f35d92110839

  • SHA1

    fcffacd0a7ae462986ab2c4cd96ab5d94a20d046

  • SHA256

    e77300727dc833908a0f819a23fe35e7d2c683ba7e9c8e7a475c2c5d9ecc03b3

  • SHA512

    85969a20ad6126c3833d73676ca7dc128c0f95597e62eb6bb23270c01c66a03a83c78be4f55e037ccae9b8c23dc7c667edcfdc5ff3e27a1f20a26b55da456d19

  • SSDEEP

    6144:zm8IQfnnxHSuHT4FZGHrCUR9bPxKSUE9r/kg8omRm:zm8zfnIJFdURVrMg+Rm

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\276e74e85741aa741019f35d92110839.exe
    "C:\Users\Admin\AppData\Local\Temp\276e74e85741aa741019f35d92110839.exe"
    1⤵
      PID:2252

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2252-0-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2252-1-0x00000000001B0000-0x00000000001B1000-memory.dmp

      Filesize

      4KB

    • memory/2252-2-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2252-4-0x00000000001B0000-0x00000000001B1000-memory.dmp

      Filesize

      4KB

    • memory/2252-9-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2252-14-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB