Analysis

  • max time kernel
    151s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/01/2024, 23:31

General

  • Target

    54e2a731c4027ed9e1d74750b208f431.exe

  • Size

    2.8MB

  • MD5

    54e2a731c4027ed9e1d74750b208f431

  • SHA1

    8be054d8eb7925696ccdf205c334b6b85dbb336f

  • SHA256

    c254969c97e1dd1059a1ff4c961f6d05d36036bd68c256f84d2268336224656e

  • SHA512

    d5ba68cb5cf8c97f7494e159e410a03a83317aed4601acc0fe755e8026d91812d42cb8eb398e0dadb1462ad33638a3edfe558cbae3e3f1fedb84f5d37a7da975

  • SSDEEP

    24576:S6pQPxQ2JyP2r5mJV91xM7RpbwgIvs7NxqUkHE6pQPxQ2JyP2r5mJV91g:SCqm2Jpr0nNM7Dus7Nx2kCqm2Jpr0nE

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\54e2a731c4027ed9e1d74750b208f431.exe
    "C:\Users\Admin\AppData\Local\Temp\54e2a731c4027ed9e1d74750b208f431.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1264

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\7-zip32.dll

    Filesize

    2.8MB

    MD5

    f998d5b5fd2906946b1a52823429b2c2

    SHA1

    88600559e8f31ce2b5f2ae612542e2b396b52ff6

    SHA256

    fad4cf106c15a712889a2dd82fc8c486dbc61718455a7b55dbdbe8bc8b02cb77

    SHA512

    2e474e2c5ea4bf5d1def272292b9d74ea4f03380459f744dd5d7e44c7b24847c90d64f7a873e1257a05ba00c1ee71d7d71b0857e72d377329f408b6ef16acc16

  • memory/1264-0-0x0000000000400000-0x00000000005BA000-memory.dmp

    Filesize

    1.7MB

  • memory/1264-914-0x0000000000400000-0x00000000005BA000-memory.dmp

    Filesize

    1.7MB