Analysis

  • max time kernel
    143s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/01/2024, 14:38

General

  • Target

    727f85573ec3a47beaada75f655e25aa.exe

  • Size

    90KB

  • MD5

    727f85573ec3a47beaada75f655e25aa

  • SHA1

    7c584c32351ea8770b43bad2837e82dfe03d8066

  • SHA256

    32e17a8ebde839e9fe4c02f4477b3bcf5a5717aa7b5a883ac5a2db1823160320

  • SHA512

    e961b41da2a21aee8d2345a8c00119ffeb5accc555a99e03964a862a68d16249f7335300fd842a3e9a175a4e81eb20dc56c9caf3c493a679cf1232cf34aafdaa

  • SSDEEP

    1536:FTmqGMVcNQYE0BN+KPOWFA60z4weNO0MaJEVM3KKwuukn:B+MVcWYE03+KPOWe64cNoaJeMKKwuukn

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\727f85573ec3a47beaada75f655e25aa.exe
    "C:\Users\Admin\AppData\Local\Temp\727f85573ec3a47beaada75f655e25aa.exe"
    1⤵
      PID:4488

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/4488-0-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB

          • memory/4488-1-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB