Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/07/2024, 22:22

General

  • Target

    0d1486b6348c1d371d0bde60bd5629e0N.exe

  • Size

    83KB

  • MD5

    0d1486b6348c1d371d0bde60bd5629e0

  • SHA1

    ee210203b575218587b34f48d6896e45d9e86f56

  • SHA256

    706bfb2633fb8d727be2f8699d958bb5ddac5622ddd37c70cf29d4a376a46e0b

  • SHA512

    3cd7f03f725214d9aa1f5e6495c855f1dbc2fb2945b2c58eca0778694b96984781d7a8e0f7048ee500d2073b4b5d3b0720dada9fda8eda1133812bc56e75bfe5

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+zK:LJ0TAz6Mte4A+aaZx8EnCGVuz

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d1486b6348c1d371d0bde60bd5629e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\0d1486b6348c1d371d0bde60bd5629e0N.exe"
    1⤵
      PID:3232

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\rifaien2-gsVNiHkTDkwuz7pn.exe

            Filesize

            83KB

            MD5

            b19c2906c36a4d4714cfd5547ce44aae

            SHA1

            665526559185ba1995b4361b0e4a3b8e8fa9f5df

            SHA256

            33da61cf42692e95b410fc242bfdcf290acec715c325a2ffdbd2081331acdfd6

            SHA512

            73c90d339062ed2a17a237f1c8d4a81b22093047692e5ef5e2dbf4b12feab04a3d560efec47c4729a5b7587b89f8ddf1bcecd50861ca039fe493bc3904c0dff6

          • memory/3232-0-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/3232-1-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/3232-7-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/3232-14-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/3232-21-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/3232-29-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB