Analysis

  • max time kernel
    141s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/07/2024, 02:17

General

  • Target

    2f020218528a73ef8a8bff46d39992d2a450e70a6ecd2ffcc7400a0ae4a222e1.exe

  • Size

    83KB

  • MD5

    ff3467a8744e9c5b424f18541920fdf0

  • SHA1

    8329e331cdc7d4b32b690b9478e343ac3f1cd842

  • SHA256

    2f020218528a73ef8a8bff46d39992d2a450e70a6ecd2ffcc7400a0ae4a222e1

  • SHA512

    cb506df42569331e737fa209c8f29dc2fa73aa74c473596150994bceab5adfefb9702567a4602fc997e33ddbc35c7056ce0b6d1ab95eedc9ee32d268c521ce99

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+GK:LJ0TAz6Mte4A+aaZx8EnCGVuG

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f020218528a73ef8a8bff46d39992d2a450e70a6ecd2ffcc7400a0ae4a222e1.exe
    "C:\Users\Admin\AppData\Local\Temp\2f020218528a73ef8a8bff46d39992d2a450e70a6ecd2ffcc7400a0ae4a222e1.exe"
    1⤵
      PID:1984

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\rifaien2-5mZvTNhzuC7QJ7c4.exe

            Filesize

            83KB

            MD5

            d4358d7709dd16aef47adc51f309bd79

            SHA1

            1ec386872c12dc463b2d03c6f052a0531052aa0b

            SHA256

            b56d126ac44466fa8d1f8ac9c9d317b9b20a31f3346b9e59aa469e44b90a82f7

            SHA512

            54716de06385c9527b8aa2abd9a53c2722492f5c9449e7fcaa07e05881070ec41c7fbaabf355d535f4419e4ae18ffb1860d171179595b507f3ce0b6df7554740

          • memory/1984-0-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/1984-1-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/1984-7-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/1984-14-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/1984-21-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/1984-28-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB