Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-01-2024 19:35

General

  • Target

    7b18df60bcea519495e8f14951b23097.exe

  • Size

    933KB

  • MD5

    7b18df60bcea519495e8f14951b23097

  • SHA1

    29f91ad53f1d5cff34ca8a9585bae77015210875

  • SHA256

    4dea15e828eff36658d4ee1d1e336fabbe5c691a4d684b3a477597032a5b5406

  • SHA512

    3fa2bdf301b9c10d97f7476c5c9f316e85e25fdeffdb11b79089ba296ca4d581e0e0745663d184124169188f69b579d75103d762f95e55306c021c875a99d61c

  • SSDEEP

    24576:VkthAHFSXKOxoS2R65WrNDsFn4VY2KZtQpQUH:V94aOORkcpQFn8KZXUH

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b18df60bcea519495e8f14951b23097.exe
    "C:\Users\Admin\AppData\Local\Temp\7b18df60bcea519495e8f14951b23097.exe"
    1⤵
      PID:1520

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1520-0-0x0000000000400000-0x00000000006EC000-memory.dmp

      Filesize

      2.9MB

    • memory/1520-1-0x0000000000400000-0x00000000006EC000-memory.dmp

      Filesize

      2.9MB