Analysis

  • max time kernel
    159s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-01-2024 04:40

General

  • Target

    4a76acd973e6f1533c17de28cffdfead.exe

  • Size

    26KB

  • MD5

    4a76acd973e6f1533c17de28cffdfead

  • SHA1

    a4af7842911bd12998d1e7a3c3a78e0bf0eb44fd

  • SHA256

    2bc2253da610b2ec92d27b587d7fb6256deeb3f39f96f40789f2a971a9d10139

  • SHA512

    2e43d4d6e9e28358b14446eb7557337a96cddf3dc5d0a23192fa4b0dd4089444cdea8184698d40589baea28a8aa5e865baf616a3d4224b03485f4c6f7f35750a

  • SSDEEP

    768:tdimawl4jakYP5qxfK3o+fskZ9je9FEPjbzV:tdim5lMaTqxUvDZ9HjHV

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a76acd973e6f1533c17de28cffdfead.exe
    "C:\Users\Admin\AppData\Local\Temp\4a76acd973e6f1533c17de28cffdfead.exe"
    1⤵
    • Drops file in Windows directory
    PID:4172

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4172-0-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/4172-1-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/4172-11-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/4172-12-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/4172-16-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/4172-18-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB