Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11-03-2024 04:35

General

  • Target

    bfdbe05d2d02d3c6395e98c8e140eb6a.exe

  • Size

    14KB

  • MD5

    bfdbe05d2d02d3c6395e98c8e140eb6a

  • SHA1

    2981170ea9baf6926310f78119a323ab025795e6

  • SHA256

    5d179293684efeb31b1c3b4bb74abebe86bdc5d20382d1afa2e9aa6b588d2d15

  • SHA512

    85c276882468266096a9a97579d2fb25f2cbedf452ae46ba452c1993656fd4d8e46a2bc074026d1efe41fe918adc47474f4cd149e512b7d32faceffb7333a65b

  • SSDEEP

    384:fo9q5pG7Vbjz0QhuvmtSh/6kTMklKBcdDtI7JliSwlmerfVjuujQA+CJwK:GqDSbP0w+mFko/B8I7JUSiVfVyLA+Kx

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: RenamesItself 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bfdbe05d2d02d3c6395e98c8e140eb6a.exe
    "C:\Users\Admin\AppData\Local\Temp\bfdbe05d2d02d3c6395e98c8e140eb6a.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    PID:2148

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2148-0-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2148-2-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB