Analysis

  • max time kernel
    1s
  • max time network
    0s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    08/01/2024, 23:16

General

  • Target

    4cb607eaf9976b3dd2fb588b45cf0ca8.exe

  • Size

    2.1MB

  • MD5

    4cb607eaf9976b3dd2fb588b45cf0ca8

  • SHA1

    af104a0e7347174fd8a496b0a5b0a4ebf591d515

  • SHA256

    98bcb051187b3ede94dda2f92a0557ce9fcc267807cb7aa9f3ef5e4224da54e3

  • SHA512

    f038999589954b0607ed7d2afdc4fde53a3651229b10b4f58b69ee18267245ccc796837f46c225d02b7b2df71b9da207812f92f00ab8f334bbb343589e3923e7

  • SSDEEP

    49152:CvR1y4XuV27B0rbafq/hoPa4uWF50GDPZadAUvrFxP1ZOrG5ZCmLPtI40oPhIt1:Iy4Xa27B0rbafmmPzuWF50GDsAUvrJZq

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4cb607eaf9976b3dd2fb588b45cf0ca8.exe
    "C:\Users\Admin\AppData\Local\Temp\4cb607eaf9976b3dd2fb588b45cf0ca8.exe"
    1⤵
      PID:3036
      • C:\Temp\WoZ.exe
        "C:\Temp\WoZ.exe"
        2⤵
          PID:2256

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Temp\mjf48.exe

              Filesize

              24KB

              MD5

              6fedf4035d98ff0c909babc2232ee4a3

              SHA1

              002a5421f28f10025327ef3c5b71635cc1639fa3

              SHA256

              47d303bc743cbfba956f1771377d33289a24d72b0950ef9a1bd1dc0edf080a11

              SHA512

              434ffb6cb47e47721ef2450760205c64da8af9b448d80f3b77ea736d312fa698ef10e727d2d003c7ea610fbd2296e2c61755cd2df71de5dc8f4fb9d3dedb6446

            • C:\Temp\mjf48.exe

              Filesize

              5KB

              MD5

              ec3a8808e984a2506a0313dd3b91b8b4

              SHA1

              7fd4463639044cb7719239a8da59ef47f083dcaf

              SHA256

              f29ec2ea9eee079be70a1dc071b568c056a23ec8346d8cf861b6c644da78977f

              SHA512

              9eaf983f14c98ac5a9a32a0cda3ba8dfd9b19b1c0ce9ee1d852945b53388653631464c27fe69c932c3cb718bb0bf6949dd252322b70741d3b3337cbdeddf9435

            • C:\Temp\mjf48.exe

              Filesize

              7KB

              MD5

              ed71186f4d4e3ad7110616668c7d07dd

              SHA1

              32cf89eab95d4e71c60bfee270cdb0f34ea0eab2

              SHA256

              7c2ba2072a1f817446c3c6bd23593e556b0e722200d6d8473adb368f9c97b073

              SHA512

              1ec61715f58683fc90a19f591d876c4f559d5ad48c0556bb3c25b500de55d0bcd1a2989fc3723ffa12b9cf3fb5924497cc679fc3d7d5744c1009d0c82938141b

            • \Temp\WoZ.exe

              Filesize

              2KB

              MD5

              0954b8b3e002b2e4f6bc87e86fc954d9

              SHA1

              8ff9f35e89aa53e59141ce9d702bb16dfd614be0

              SHA256

              e6d970f799ae06ba03c6a2e2ff051403ec6ea2df4d631f74b8ce4381acbc98aa

              SHA512

              3ea67fcd9c0bc7e14cf18d25c30dc76ecb5239113599785924323d47fd2aba75fa0947da2e431c79252f947272bbb7e22af061fb29e014db876916631799e0fe

            • \Temp\mjf48.exe

              Filesize

              1KB

              MD5

              d29da8a2d05d400db0cb430eb2f03765

              SHA1

              150ec6291a7ac298800ed6e9167a4ffd4380acc9

              SHA256

              1f50af13a88b1d2388bcbc1e531cf81426d66ecbfe38e11a54b40bb4452811b8

              SHA512

              5a5856af624b21ced9307e2a506b0fda9f63b0d20aeb33e27fa5ef0c3ada51b919bd004e79bb61017372c920ced753a0b71b72e3bac567bc0f004818536d700d

            • memory/1436-67-0x0000000000400000-0x00000000005AF000-memory.dmp

              Filesize

              1.7MB

            • memory/1436-66-0x0000000000400000-0x00000000005AF000-memory.dmp

              Filesize

              1.7MB

            • memory/2092-62-0x0000000000400000-0x00000000005AF000-memory.dmp

              Filesize

              1.7MB

            • memory/2484-25-0x0000000000400000-0x00000000005AF000-memory.dmp

              Filesize

              1.7MB

            • memory/2484-44-0x0000000000400000-0x00000000005AF000-memory.dmp

              Filesize

              1.7MB

            • memory/2484-65-0x00000000033A0000-0x000000000354F000-memory.dmp

              Filesize

              1.7MB

            • memory/2484-35-0x00000000020D0000-0x00000000021D4000-memory.dmp

              Filesize

              1.0MB

            • memory/2484-36-0x00000000020D0000-0x00000000021D4000-memory.dmp

              Filesize

              1.0MB

            • memory/2484-24-0x0000000000400000-0x00000000005AF000-memory.dmp

              Filesize

              1.7MB

            • memory/2484-26-0x00000000020D0000-0x00000000021D4000-memory.dmp

              Filesize

              1.0MB

            • memory/2484-33-0x00000000020D0000-0x00000000021D4000-memory.dmp

              Filesize

              1.0MB

            • memory/2484-45-0x00000000020D0000-0x00000000021D4000-memory.dmp

              Filesize

              1.0MB

            • memory/2484-59-0x00000000033A0000-0x000000000354F000-memory.dmp

              Filesize

              1.7MB

            • memory/2904-22-0x0000000001E40000-0x0000000001FEF000-memory.dmp

              Filesize

              1.7MB

            • memory/2904-20-0x0000000000400000-0x00000000005AF000-memory.dmp

              Filesize

              1.7MB

            • memory/3036-19-0x0000000000400000-0x0000000000800000-memory.dmp

              Filesize

              4.0MB

            • memory/3036-23-0x0000000002CB0000-0x0000000002E5F000-memory.dmp

              Filesize

              1.7MB