Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-06-2024 01:27

General

  • Target

    46a5c235e876f146b6a96be67b3c01f0.exe

  • Size

    83KB

  • MD5

    46a5c235e876f146b6a96be67b3c01f0

  • SHA1

    f59615e44c0a05d764d2cf34bfa1c2981ca41c00

  • SHA256

    457adfd4d0344db46c6acbb3a9871b7932fcb7d9f5b7136c28eef5fbddce77cd

  • SHA512

    e6b03ad2c81f2e1875f79606516dbd4664636c3727614f2a730a3c82d745d67c24f9d62a9a9bd6a0dd7b1960b8f184f3ee8ee88806295873a1fd2bc0424c29d1

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+JK:LJ0TAz6Mte4A+aaZx8EnCGVuJ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\46a5c235e876f146b6a96be67b3c01f0.exe
    "C:\Users\Admin\AppData\Local\Temp\46a5c235e876f146b6a96be67b3c01f0.exe"
    1⤵
      PID:1496
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4240 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:404

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\rifaien2-VSeIHSVJmCs4fpKX.exe

        Filesize

        83KB

        MD5

        910a71fc93f0db24f20fc6a98797f09c

        SHA1

        d874b01802dc5f84a658758bff922654c6eb1fc1

        SHA256

        9baa6026ac51b468b0e93c287fdc866950c13a083874d63999d5db24215831c0

        SHA512

        34f0d43eac156faffd4c0b0769698001079a9e2153cd09a6f4c3b1cbfc907d8af98a9c1338d79c852450f3911ddc79618cddc23083bf7d4dcd12f3839925be31

      • memory/1496-0-0x0000000000400000-0x000000000042A000-memory.dmp

        Filesize

        168KB

      • memory/1496-1-0x0000000000400000-0x000000000042A000-memory.dmp

        Filesize

        168KB

      • memory/1496-8-0x0000000000400000-0x000000000042A000-memory.dmp

        Filesize

        168KB

      • memory/1496-15-0x0000000000400000-0x000000000042A000-memory.dmp

        Filesize

        168KB

      • memory/1496-22-0x0000000000400000-0x000000000042A000-memory.dmp

        Filesize

        168KB

      • memory/1496-29-0x0000000000400000-0x000000000042A000-memory.dmp

        Filesize

        168KB