Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-06-2024 01:34

General

  • Target

    46d50a1820188bfbd7939e884def2740.exe

  • Size

    83KB

  • MD5

    46d50a1820188bfbd7939e884def2740

  • SHA1

    b0bedfe6e64cb77f8e7fc51657e2aa9adbf0c87d

  • SHA256

    191ab5a4a1b7354b7a7e8a12fb0cbb4c57d26f831d6a3d6fcb7ff8d8bf395f73

  • SHA512

    6e60d11cc4e6512052953d17a24fde69a5a762a346fcc323f18a38584e6394ce1d405991e2eddaf2550e79c8b474daff707c27d331777a6c534b1349a1c568ea

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+MK:LJ0TAz6Mte4A+aaZx8EnCGVuM

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\46d50a1820188bfbd7939e884def2740.exe
    "C:\Users\Admin\AppData\Local\Temp\46d50a1820188bfbd7939e884def2740.exe"
    1⤵
      PID:1208

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1208-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1208-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1208-4-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1208-10-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1208-15-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB