Analysis

  • max time kernel
    145s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-01-2024 09:23

General

  • Target

    45def2efcf915346cc99326e8f7ae6c0.exe

  • Size

    22KB

  • MD5

    45def2efcf915346cc99326e8f7ae6c0

  • SHA1

    c1ff0d40e0acba55766704fb1e8f2b0e2e79557b

  • SHA256

    4889e4754b16ebccde9dec5e3072ebce42b2ea678beb8dbe81a5fcc0cf5d3251

  • SHA512

    1b9d7091925fb58ab5668d38d2f8d1a57bacc52fa5edf75c9070ea2bfc2df51d45485d8031c7e0b12531e1bc7bfcaf599ba300a02af30f1c5ae6cf82fed3e494

  • SSDEEP

    384:7XBi45U8wAeTmN2lSTZg35IW4lFI1gm/HgcDpUqMRTqIFYWm:7xH6VxmYlS9dW4l+IcFRMRTbFY

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 15 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\45def2efcf915346cc99326e8f7ae6c0.exe
    "C:\Users\Admin\AppData\Local\Temp\45def2efcf915346cc99326e8f7ae6c0.exe"
    1⤵
      PID:836

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\mm.pid

      Filesize

      4B

      MD5

      551939a30ce859a19015a3506ca19427

      SHA1

      c373825416f70a9fc1db52aa806b106ab409f4b6

      SHA256

      ce8351c6b1ae4cdeb78011b65940e1ce2deccbcf4d2d08d4a64e9e80a0f9eabd

      SHA512

      81b6e1ec85d9bf067851f422f1eb8875d248cf12ac7c23afca733649dd5995deef448eb36cdb03cc9456ccdcb44a49d82853b6acd11e144c1e262cc7b5628657

    • memory/836-21-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/836-24-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/836-8-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/836-10-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/836-13-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/836-16-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/836-5-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/836-0-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/836-18-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/836-26-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/836-29-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/836-31-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/836-34-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/836-37-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/836-39-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB