Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    08-01-2024 07:32

General

  • Target

    DC0022.Jpg________________________________________________________________________.exe

  • Size

    44KB

  • MD5

    2deb5c559a49f2101fa7c631f9726f08

  • SHA1

    5613560a39fb7cf9c7ab35f4a99ffcb8a526a111

  • SHA256

    dfb02432b4b6246ee55b789c5fff04e628b82b1e144f5cd7a87def64027fc74b

  • SHA512

    58d495bb3e5e39cd8c205c0b05703ef95f8585a6fe3f5a61eaa66c432f7ebf713060e33363ed1c8bbf8138d18f1bd5731e4537ab378ce0599bbb539ff8e27d4a

  • SSDEEP

    768:OvMuNTkiAF6Us2qJywber9vPXZODFpoJu6eWZvP2/JxvgyZKSa5:XkTLt9RyvPsoDXeJdHZKS8

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\DC0022.Jpg________________________________________________________________________.exe
    "C:\Users\Admin\AppData\Local\Temp\DC0022.Jpg________________________________________________________________________.exe"
    1⤵
      PID:1216

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1216-0-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/1216-1-0x00000000001B0000-0x00000000001B2000-memory.dmp

      Filesize

      8KB

    • memory/1216-3-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/1216-2-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB