Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-03-2024 17:36

General

  • Target

    cc0387f1b0070d06e7ba3e0ecf667b68.exe

  • Size

    199KB

  • MD5

    cc0387f1b0070d06e7ba3e0ecf667b68

  • SHA1

    f6593d98c431038cbfdfc922bbf70d7619b2ea85

  • SHA256

    52263f61b987bcb8c18dddb9cd67d7ced8d0ce92e53e855f225d45a2348c9100

  • SHA512

    b38d76f85319101fbdbbf4ff3e9e294a46a1badf4aad2536e8215161e24c7cf844228f5d60d52591a45aa7457a292d272715c2b91e5f14dd01104f43b42e2716

  • SSDEEP

    6144:xI4HMKF6HEQbpfgZaX+fLFto9ze8YzOpukdFmbB5RmNumruN6udi:xXRsEQbpfgZaX25to9zezzzknm/RmNuS

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc0387f1b0070d06e7ba3e0ecf667b68.exe
    "C:\Users\Admin\AppData\Local\Temp\cc0387f1b0070d06e7ba3e0ecf667b68.exe"
    1⤵
      PID:1620

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1620-0-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB

    • memory/1620-1-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB