Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07-04-2024 16:55

General

  • Target

    kZF3r2E.exe

  • Size

    3.4MB

  • MD5

    42bd5d3ca66f4f9225a36bbe3a39c446

  • SHA1

    f67ac8661efee4f6106ee51ea30178bb16f91285

  • SHA256

    31417e74d6646eb04a5da10d26565cd67bf99a36def8825c6bceaa3e6eab5906

  • SHA512

    d84ed2ebdde0e92914aa758f83501f8be059294286a3a3c6d002b9a1e984fc193b5e0387ead41dc07d4c242647c2d410ebe8d218719e2cf2b90a727ce4d53dd6

  • SSDEEP

    98304:6WnL1M2XNmcGCVIps5phuIMAbvbJaJNQqPAbsU8968Vum8z22E:6Wu2Qcvlh9vbvWobIbG3E

Score
7/10
upx

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\kZF3r2E.exe
    "C:\Users\Admin\AppData\Local\Temp\kZF3r2E.exe"
    1⤵
    • Loads dropped DLL
    PID:2056

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\Opera_installer_2404071655363132056.dll

    Filesize

    5.2MB

    MD5

    7c4c89e7a2b29a8fc7c24fd158761f5f

    SHA1

    f05bddcb3df1811d104939192510d7afce5bf9b1

    SHA256

    b2b0b0372fea8c706860f531099234dd2e90a5648adba0e540cb1eeba6ea0d99

    SHA512

    135bea3366b56f78d78d71969f8ae09fca130339e8989480c29b9970e35c9ed81bccb0a26e68fa572d254d2434f10c28e200baf2044248378724fd471483cd0c

  • memory/2056-4-0x0000000000B80000-0x0000000001140000-memory.dmp

    Filesize

    5.8MB

  • memory/2056-7-0x0000000000B80000-0x0000000001140000-memory.dmp

    Filesize

    5.8MB