Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2024, 06:27

General

  • Target

    c01436f862a0dfa2289634344d00f1aa.exe

  • Size

    401KB

  • MD5

    c01436f862a0dfa2289634344d00f1aa

  • SHA1

    35b4e124c061d14b66a64eec29cda3d7d0723fb6

  • SHA256

    6d79b6559b7136ba9825e59b9c61f4e48374bd8f71c86b5a077f7a63456f65e3

  • SHA512

    d6ca1eca17e5fc6de9f60bc9ff0df0258fbf6b255bd6e5de8b5537e912e956d3ba9bf692510b23e666d628783bdbb24489684146d744d96056abd2a50465a606

  • SSDEEP

    6144:PGtsDPOXAdff3CgzuBrv5/EVKTTP92EW1DNvBOZUjYt:lbdfK66v5/EuT0EWFOaEt

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c01436f862a0dfa2289634344d00f1aa.exe
    "C:\Users\Admin\AppData\Local\Temp\c01436f862a0dfa2289634344d00f1aa.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    PID:4112

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\odt\office2016setup.exe-

    Filesize

    5.4MB

    MD5

    538bdea39ee4ae64b959e89699433604

    SHA1

    27bed8152e1eb7527eb4ee4eb525a07fa8aba6db

    SHA256

    8634649cd095484d1c6f02a67641a8053f07cf6fd57c12b22481afbd5f9f15c5

    SHA512

    5b3dd77930eec3b58fa78b636b7f47ed983d9eee27f269d1cc05ae7d648c09f02bd63983ee12f1ee838adf7653ed2fe3aa3a16d780ba39d69adb565a383935eb

  • memory/4112-0-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/4112-2783-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/4112-4268-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/4112-4269-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/4112-4273-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB