Analysis

  • max time kernel
    3s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/01/2024, 19:14

General

  • Target

    4c3d7990ddcaad51ef21052532818d8d.exe

  • Size

    1.8MB

  • MD5

    4c3d7990ddcaad51ef21052532818d8d

  • SHA1

    0738381c475fb6a8197a0b92473c514e03e07a48

  • SHA256

    8d9a32715ae0eec783bb175f6490f8b0446fc04601e710e49a230355e3b09cbd

  • SHA512

    9c8e4144abffac0be2d83ff874140d9a2ef43fe644ab75c3cac205cfdd36947088c5f2c31ecca5ebaf4d58d3fcee436b4d67f3399dd1bfef433c77000b8ef789

  • SSDEEP

    24576:S6pQPxQ2JyP2r5mJV91xM7RpbwgIvs7Nxqz:SCqm2Jpr0nNM7Dus7Nxe

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c3d7990ddcaad51ef21052532818d8d.exe
    "C:\Users\Admin\AppData\Local\Temp\4c3d7990ddcaad51ef21052532818d8d.exe"
    1⤵
    • Drops file in Program Files directory
    PID:960

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/960-0-0x0000000000400000-0x00000000005BA000-memory.dmp

    Filesize

    1.7MB

  • memory/960-5745-0x0000000000400000-0x00000000005BA000-memory.dmp

    Filesize

    1.7MB

  • memory/960-13397-0x0000000000400000-0x00000000005BA000-memory.dmp

    Filesize

    1.7MB