Analysis

  • max time kernel
    119s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19/01/2024, 06:56

General

  • Target

    66fb37171da320f9d83e9680fa7b3f4e.exe

  • Size

    21KB

  • MD5

    66fb37171da320f9d83e9680fa7b3f4e

  • SHA1

    06470b608e72e2b082f51c9384db301e85606863

  • SHA256

    e1ecf7096a333adf7b8fc1803a68036379a749d8e1512a1b81d62b679a7afbf3

  • SHA512

    6b799c1a4cf9492eae2a5ed2ba707e3aec959b88d5198ee9cfa04eef5376c22cd7186964e8db7254e7020ebb11d05aa6bb1324481fdf0e27ea77647b3af37a83

  • SSDEEP

    384:6u0cnxzc9/CDBkvl1aYbLT4RN2dvmjTNWmqG0niE5xsyeM4mYnQ1:z1zc9u2vl5T4Ry+dWBG08u

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\66fb37171da320f9d83e9680fa7b3f4e.exe
    "C:\Users\Admin\AppData\Local\Temp\66fb37171da320f9d83e9680fa7b3f4e.exe"
    1⤵
      PID:2036

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2036-1-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB