Analysis

  • max time kernel
    136s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/02/2024, 13:01

General

  • Target

    86f35caa9fbe7984f36f32e148f98cbf.exe

  • Size

    14KB

  • MD5

    86f35caa9fbe7984f36f32e148f98cbf

  • SHA1

    a5e7b60c686da3d26fa15fbd1cde332abbe6637e

  • SHA256

    8ff762939943da8cc158697a74a85af92e344c15ef20ce98182c300992a236a9

  • SHA512

    d2ce9dee3d0559743cf40edad99299aa82143400d81601610447e310a0e45bc32b5b560c14a0d0b0aa8db7231e59c2bfcd640c9f19bbdf5cf49a2a61fecf3cb5

  • SSDEEP

    192:EkvjLCyJA0CdjoNm/abB2R1S6D/8N+SHekJijFunfmt8ov2FyuQy6oUJPtKe3THG:vXJmsf2W6D/8N+SdJY8Ty263JkATGj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: RenamesItself 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\86f35caa9fbe7984f36f32e148f98cbf.exe
    "C:\Users\Admin\AppData\Local\Temp\86f35caa9fbe7984f36f32e148f98cbf.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    PID:3804

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3804-0-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/3804-2-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB