Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    21/05/2024, 02:49

General

  • Target

    b004e5e323cf3d5133533f2ec294224c10c20f6fc4918822b6e2517bb09e2876.exe

  • Size

    83KB

  • MD5

    d10c3e6d93fd19cf5f9ea12e324b0373

  • SHA1

    6be1f9026716b14385479c6d06cdc89869b71215

  • SHA256

    b004e5e323cf3d5133533f2ec294224c10c20f6fc4918822b6e2517bb09e2876

  • SHA512

    587e0297027fd9ab9f7a5e80b4a1fb431c838882e3ddc97c506ff11c0a516bba5831658579080805735c04c8ad7fdcc8d7ba4baf8ca3ea4ba4cd80ca5718f77a

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+8K:LJ0TAz6Mte4A+aaZx8EnCGVu8

Score
9/10
upx

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 7 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b004e5e323cf3d5133533f2ec294224c10c20f6fc4918822b6e2517bb09e2876.exe
    "C:\Users\Admin\AppData\Local\Temp\b004e5e323cf3d5133533f2ec294224c10c20f6fc4918822b6e2517bb09e2876.exe"
    1⤵
      PID:2080

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-kcwSAZPjSAQvjxCK.exe

      Filesize

      83KB

      MD5

      7dbc7f36b9008bbe113c0961cebdbc87

      SHA1

      4797952ef636785150fca0731c20f516c18b2790

      SHA256

      e2ca1a390b01098efe19cf0d5defeb7a3f99b3b547bfc915d5617bc331791e12

      SHA512

      9a09e477cb7c6d72e823c7e016fe5774f22437240c052b2a7c96f9fc9fdf48053bc018b76b6502732bef9b5afd96447aec2f3bf4bab37fbad7990c5281edf64d

    • memory/2080-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2080-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2080-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2080-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2080-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2080-28-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB