Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-01-2024 02:53

General

  • Target

    57cb329b78e2c1928b002371383e71ac.exe

  • Size

    49KB

  • MD5

    57cb329b78e2c1928b002371383e71ac

  • SHA1

    53bcf0168cd93356b3876e1f045f9b5ef7e048b5

  • SHA256

    14ad703251ed6cf37e856541e181baae8be11c1422f4561d6ec67863d0d273c0

  • SHA512

    e3e0ba02cd59cff0d7b1801e69a32885e0b3a346cc3b41cc02901c5eed208f9c068661a991f3274f5c6ae6a7d68fae0eba706f23043a4743c00786dab5ebf666

  • SSDEEP

    768:ZcYL0a5Fnfb1HlKHhwY9WZ10EJZHf3S9mlDH2gn72XveUEoiROw79dQFTWFu6lu6:ZcY4a5FnTFAhUHhWVmroiROG+I46lJ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\57cb329b78e2c1928b002371383e71ac.exe
    "C:\Users\Admin\AppData\Local\Temp\57cb329b78e2c1928b002371383e71ac.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:5108

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5108-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/5108-2-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB