Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    08/01/2024, 18:13

General

  • Target

    4c1f5cf296b9700506e1f6f749d748a9.exe

  • Size

    162KB

  • MD5

    4c1f5cf296b9700506e1f6f749d748a9

  • SHA1

    0a2422ff1b1ccce090e8d3787d1992a20b86f105

  • SHA256

    e012b174765bb416cf78e87475fcad1a4718df18af361eafb53773aa044c7ba5

  • SHA512

    95a9ae66fdb142656de68efd350842ac7f49f53fb34a7654f42a0f70ff2c00b3716c54badcb2f0130a3793dc2d9c1ebdd21243c4527ef55be027a499cb16a89f

  • SSDEEP

    3072:ftXf0uTMHeFSKeasVJGhkYThPL3sX0WpmdMX2LhOdVsyN2EoutK:1P0ui7tasGhFThPgkumd6VbYEoSK

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c1f5cf296b9700506e1f6f749d748a9.exe
    "C:\Users\Admin\AppData\Local\Temp\4c1f5cf296b9700506e1f6f749d748a9.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1680

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1680-0-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/1680-1-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/1680-2-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB