Analysis

  • max time kernel
    93s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/06/2024, 01:20

General

  • Target

    a1f1fd49360222478dcfe7aec62dd4013e730d0b2b7a012f9efdc3a0815ab868.exe

  • Size

    122KB

  • MD5

    c1384b59319673c924f99ef043cc8ff6

  • SHA1

    05372bc3a159c81d1f73c1f7d3fcad1c095e6e8b

  • SHA256

    a1f1fd49360222478dcfe7aec62dd4013e730d0b2b7a012f9efdc3a0815ab868

  • SHA512

    454c25f6cfab31f98e9d0d74ee49a766c757da67d5d6ead51eedc33079af10ead37b7d7d1272bb8ae2c6e17fc5cc251c089f46a3c354c3693eb5f53e5aded49c

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8zxUTmXadjUSbcDemTPAZk+cLtdNlb9PfESDOay6:KQSoh6W2QZwKS7l

Score
9/10
upx

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 2 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1f1fd49360222478dcfe7aec62dd4013e730d0b2b7a012f9efdc3a0815ab868.exe
    "C:\Users\Admin\AppData\Local\Temp\a1f1fd49360222478dcfe7aec62dd4013e730d0b2b7a012f9efdc3a0815ab868.exe"
    1⤵
      PID:912

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/912-0-0x0000000000400000-0x000000000040A000-memory.dmp

            Filesize

            40KB

          • memory/912-1-0x0000000000400000-0x000000000040A000-memory.dmp

            Filesize

            40KB