Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    07-07-2024 04:49

General

  • Target

    e54d7e7592e079cff7731a4f40a495e08df903ec0977eafccab5f420e4c2f2d0.exe

  • Size

    83KB

  • MD5

    f850bedaa1b034986e808829f504ea2b

  • SHA1

    3020abb1bd9153491347862b4d50e21167dc04fa

  • SHA256

    e54d7e7592e079cff7731a4f40a495e08df903ec0977eafccab5f420e4c2f2d0

  • SHA512

    08041052dd95d1ab08a72d36561fb874ee81c81e6e6db312ae82a2923abdcc182ae0fcde88c7ff4e8cf561eda86ad4565b7d19ae540ab18a660d9cf1a3c19cef

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+qK:LJ0TAz6Mte4A+aaZx8EnCGVuq

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e54d7e7592e079cff7731a4f40a495e08df903ec0977eafccab5f420e4c2f2d0.exe
    "C:\Users\Admin\AppData\Local\Temp\e54d7e7592e079cff7731a4f40a495e08df903ec0977eafccab5f420e4c2f2d0.exe"
    1⤵
      PID:1712

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-DD1RKnPWODI1JH2N.exe

      Filesize

      83KB

      MD5

      94a51373a9b0f615b7847570ca31d5ee

      SHA1

      8212fc53e424c62d368d65a4d254fa2023b49374

      SHA256

      bd95758a5e4af2115c9f7a379188b60cb4398bf377034a07ca200a75eedd673e

      SHA512

      4cf2b0b717954f69e063b08044c2ce77efe087ea29e9c4c8fbce5423d64ab2d3c4941fcbc1d59112da8c6ccc791faddf48b64f6e68101dcc1fa137af1a9dd42f

    • memory/1712-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1712-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1712-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1712-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1712-20-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1712-27-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB