Analysis

  • max time kernel
    141s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 00:14

General

  • Target

    7c01a99a7b0b8536d25d4a2f32b9547fe591cfe9c0fa2bdf2302d9057bd0c9af.exe

  • Size

    83KB

  • MD5

    68cd90bb93b8836b414aaa5abe7bcdcc

  • SHA1

    9bc8c14487924900524bdcf329040dabc9863118

  • SHA256

    7c01a99a7b0b8536d25d4a2f32b9547fe591cfe9c0fa2bdf2302d9057bd0c9af

  • SHA512

    dee3349b7add578edfb272b7f16411a6bf0ff4de13b37306d0df1dd582298be555f68630fb12c5847934566c8b660644f3a462da12b4b5e26f34dcfde632a821

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+AK:LJ0TAz6Mte4A+aaZx8EnCGVuA

Score
9/10
upx

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 7 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c01a99a7b0b8536d25d4a2f32b9547fe591cfe9c0fa2bdf2302d9057bd0c9af.exe
    "C:\Users\Admin\AppData\Local\Temp\7c01a99a7b0b8536d25d4a2f32b9547fe591cfe9c0fa2bdf2302d9057bd0c9af.exe"
    1⤵
      PID:2696

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-7g2kZY64D00chFVu.exe

      Filesize

      83KB

      MD5

      a6a1562b95fa9329982fbe4530aee477

      SHA1

      891246cf8e6d414c3b05fcd765353c7ee5c1bd63

      SHA256

      151be80df40ec8ed1b8d58753aaebff62bae7cd72de7bd5748b4c163606512a5

      SHA512

      1e19fafd468861e26358966899353e567e9657720508f8e4dd8ad0498e4d13ba588cde70213402538bc092708011b567afdfc3f05f94ff2bc6f53f7be0af333f

    • memory/2696-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2696-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2696-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2696-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2696-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2696-28-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB