Analysis

  • max time kernel
    36s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    06-01-2024 20:37

General

  • Target

    4720b210215997568a4e37df70b1b0b4.exe

  • Size

    5KB

  • MD5

    4720b210215997568a4e37df70b1b0b4

  • SHA1

    78ce96cc0e4504839fec61e38b6c9d8358982427

  • SHA256

    10ea5f603ef88661f073af4a8ffafa8f4905c3c9ff444da4c9c04712cbb5d050

  • SHA512

    b0caa56702003e5cdd91b9e2384d5a33c0b43f9a64ced479af9ec69b6362cde45870cc36d9a47d0608a1b5bfc9cfd595feecb2759008b43515b70732e6b37848

  • SSDEEP

    96:GAHnn8ic2M7o8RdE2herZ/YiGg6VEVgBwB/TBDImWqGm8o:GAnc5o2GaerBP/FIm9Gmz

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4720b210215997568a4e37df70b1b0b4.exe
    "C:\Users\Admin\AppData\Local\Temp\4720b210215997568a4e37df70b1b0b4.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2344

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2344-0-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB