Analysis

  • max time kernel
    141s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-05-2024 02:00

General

  • Target

    Steamy_p.exe

  • Size

    2.1MB

  • MD5

    7cc67fe5715d822d9c2ad6c0a7f77c22

  • SHA1

    2cc452d8d3809f5e3b8ceb82ed4bee1807201dac

  • SHA256

    a0c0dc5f81e4dc7a56e01d25ff52905a943a7d52c4e68578b1ad28ac3f84e07a

  • SHA512

    3cf02fb91ef3fdad157746ad1b559e054a2bec23a9fd88c77c5fd905974d0063a59d404bffae93204445bd9069fea47e5fb156af13b22b480694c46eb17cea37

  • SSDEEP

    24576:VXs9PbMqM0Ub8m657w6ZBLmkitKqBCjC0PDgM5AZFkm8CQ5HIxtxayKyKZRQ6Ijv:mbGVV1BCjByJQ5HGtJYZRJI

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Steamy_p.exe
    "C:\Users\Admin\AppData\Local\Temp\Steamy_p.exe"
    1⤵
      PID:3420

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3420-0-0x0000000000400000-0x000000000050A000-memory.dmp

      Filesize

      1.0MB

    • memory/3420-1-0x00007FFA10B90000-0x00007FFA10BB2000-memory.dmp

      Filesize

      136KB

    • memory/3420-2-0x0000000000400000-0x000000000046C000-memory.dmp

      Filesize

      432KB

    • memory/3420-7-0x0000000003830000-0x000000000384C000-memory.dmp

      Filesize

      112KB

    • memory/3420-9-0x0000000000400000-0x000000000050A000-memory.dmp

      Filesize

      1.0MB