Analysis

  • max time kernel
    140s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-05-2024 19:40

General

  • Target

    17eadb98d823e523aa5d18400687ba3a4c144beb3b1a0ebade2e15c18a333caf.exe

  • Size

    83KB

  • MD5

    37d486fac5c9db09ea3a0f6b2832df05

  • SHA1

    e64064045acc760b710c09622e065d1fbdfda8a0

  • SHA256

    17eadb98d823e523aa5d18400687ba3a4c144beb3b1a0ebade2e15c18a333caf

  • SHA512

    7d38a96b56c37e445298bca13a120fce0fd695c79ac76102c7684b0083a5655c32910fcfd7a127c4647eecce71b08a3ea3d765064c43f23f9cc5f1c1538f7dff

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+bK:LJ0TAz6Mte4A+aaZx8EnCGVub

Score
9/10
upx

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 7 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\17eadb98d823e523aa5d18400687ba3a4c144beb3b1a0ebade2e15c18a333caf.exe
    "C:\Users\Admin\AppData\Local\Temp\17eadb98d823e523aa5d18400687ba3a4c144beb3b1a0ebade2e15c18a333caf.exe"
    1⤵
      PID:2772

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-jN3WzYELof8cBxu2.exe

      Filesize

      83KB

      MD5

      5cc317ca2077cb0ac78867ce1fb57ef0

      SHA1

      3448ff03cbafc38d067f126203a256b404656d54

      SHA256

      6024107fbfdb6a27188d23d61a08405a6e9b9f47abc2c415c88238b829ff73d6

      SHA512

      ddf5a854458c6fe21cfac388b3f0bdf453e4c9706f664638f4218e592329d46c03ada59bb51362649a2d51507dc4de6cde491d53f292d6f3a81fb7e43727643f

    • memory/2772-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2772-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2772-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2772-13-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2772-20-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2772-27-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB