Analysis

  • max time kernel
    145s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-01-2024 13:17

General

  • Target

    40f674daf74dfa82a7d681e1ec54c15e.exe

  • Size

    12KB

  • MD5

    40f674daf74dfa82a7d681e1ec54c15e

  • SHA1

    21b3a86c230b7e9b188c323ed18464dc83441297

  • SHA256

    ad1ec4d3eaeced53724801b930792b366dcad1478bfbcdea7ba626e816be3691

  • SHA512

    2813a25b9aff248f7059ab35257c91465a2e0bb4260ff631f770743a24a8baffd27fe6742b7299c48711696ff81e94378eb165e3d1a45d8b4d8e2b19dd24f27a

  • SSDEEP

    192:E5UBXvfAc2wnYYo3p/GhJ05QZO4FdI0c4pWE2Tg7wzyyTwJJ4eWE:ESvH2wnYYs/gZdFdjxpWE2Tcw1TwDh

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\40f674daf74dfa82a7d681e1ec54c15e.exe
    "C:\Users\Admin\AppData\Local\Temp\40f674daf74dfa82a7d681e1ec54c15e.exe"
    1⤵
      PID:4636

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4636-0-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/4636-1-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/4636-3-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/4636-4-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/4636-2-0x00000000001C0000-0x00000000001C3000-memory.dmp

      Filesize

      12KB