Analysis

  • max time kernel
    93s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-04-2024 14:11

General

  • Target

    490213b032c9bb8b1d2a3e2e4378d0d57ee657e06c7b73179fec643901d6de13.exe

  • Size

    9.5MB

  • MD5

    d558c4ad470922b27d4c93e053ae7264

  • SHA1

    23620076cbaa84e8f30e566f918493c06f91d261

  • SHA256

    490213b032c9bb8b1d2a3e2e4378d0d57ee657e06c7b73179fec643901d6de13

  • SHA512

    b1c6d8ff01b5685976d87ef1b384a0623108eb9b1c15de0a880ec8e5b08ecc50c07c5f102978084842cd5890e41647a7017591ed0651583dcbaf5fe4c3229041

  • SSDEEP

    49152:rm8gpIZ7kIg6bargtJL9NTijm16OTT0VVN+jteagbuVKONpwwKdYSF4iPbQOaogN:r/YhbjZe

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\490213b032c9bb8b1d2a3e2e4378d0d57ee657e06c7b73179fec643901d6de13.exe
    "C:\Users\Admin\AppData\Local\Temp\490213b032c9bb8b1d2a3e2e4378d0d57ee657e06c7b73179fec643901d6de13.exe"
    1⤵
      PID:3892

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3892-0-0x000001CFE9950000-0x000001CFE9F50000-memory.dmp

      Filesize

      6.0MB

    • memory/3892-1-0x000001CFE9200000-0x000001CFE9201000-memory.dmp

      Filesize

      4KB

    • memory/3892-2-0x0000000000400000-0x0000000001BC7000-memory.dmp

      Filesize

      23.8MB

    • memory/3892-4-0x0000000000400000-0x0000000001BC7000-memory.dmp

      Filesize

      23.8MB

    • memory/3892-3-0x0000000000400000-0x0000000001BC7000-memory.dmp

      Filesize

      23.8MB

    • memory/3892-5-0x0000000000400000-0x0000000001BC7000-memory.dmp

      Filesize

      23.8MB

    • memory/3892-6-0x0000000000400000-0x0000000001BC7000-memory.dmp

      Filesize

      23.8MB

    • memory/3892-8-0x0000000000400000-0x0000000001BC7000-memory.dmp

      Filesize

      23.8MB

    • memory/3892-11-0x00007FF6608C0000-0x00007FF66122F000-memory.dmp

      Filesize

      9.4MB