Analysis

  • max time kernel
    140s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/07/2024, 02:29

General

  • Target

    b1aeb4dd333ceca84d688b624dc306ba1d013e87c33253df646b80ed9b386f28.exe

  • Size

    83KB

  • MD5

    2adf53282eb2d9881a9c418a242e8d93

  • SHA1

    9e10744ce0f7cf419a6ea0b75d28840ce7976e1a

  • SHA256

    b1aeb4dd333ceca84d688b624dc306ba1d013e87c33253df646b80ed9b386f28

  • SHA512

    5bc2077e89368c997c3264b982a83d5dcb35b47bbe33e8b1d1fb0f060a1984621dcd5587e7933ee269266fe3fd83782e37a185fc093588a59ea148b4b90eb8e8

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+RK:LJ0TAz6Mte4A+aaZx8EnCGVuR

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1aeb4dd333ceca84d688b624dc306ba1d013e87c33253df646b80ed9b386f28.exe
    "C:\Users\Admin\AppData\Local\Temp\b1aeb4dd333ceca84d688b624dc306ba1d013e87c33253df646b80ed9b386f28.exe"
    1⤵
      PID:368

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-1IKzMSHGONSZiYAF.exe

      Filesize

      83KB

      MD5

      ad79b011ca7391350728dfe21e4db3d6

      SHA1

      8695c3bbefe35272fe5d70ee1e4ea924884554c9

      SHA256

      86796dae8b76d553746cec6de87404108c3e7bfad41783d260debf845d107dca

      SHA512

      949bb80b6abc0b1b63f883ffa6683bfe2f6fcd4d149a7a1ecc215fa94060ddfe6066b516d1d39f6d9adc1ab26699e82781081015c7b27c10464706c40757280c

    • memory/368-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/368-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/368-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/368-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/368-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/368-28-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB