Analysis

  • max time kernel
    112s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2024, 22:45

General

  • Target

    197368e5fa85d1dc7a5f4cee036cb360N.exe

  • Size

    83KB

  • MD5

    197368e5fa85d1dc7a5f4cee036cb360

  • SHA1

    1de7b776f70a1407e4b691f80a4b1f7ee9fa97ff

  • SHA256

    2e4fa86607afe858c675e23c40c0245b870b80b3d28f669e696829277a84a2cb

  • SHA512

    5b123aef9dae5ae5dead74ae1e167e01f826461ec50b511e0245a89f4dfca8e3191dd39791e85db576fba8dd6acada4e338f5c7bd2b5bd0504aed557ee063b9c

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+GK:LJ0TAz6Mte4A+aaZx8EnCGVuG

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\197368e5fa85d1dc7a5f4cee036cb360N.exe
    "C:\Users\Admin\AppData\Local\Temp\197368e5fa85d1dc7a5f4cee036cb360N.exe"
    1⤵
      PID:3032

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-NT0KXCaxVKfVTkhY.exe

      Filesize

      83KB

      MD5

      7a427b5989784b37d15f580745b5ae7e

      SHA1

      36d29977d720155c0e0933ffd2d1a77e634d2575

      SHA256

      6c78200242dd295c89e05859cf36bb3fbdaa1e4a7e667d9849686000d57561fd

      SHA512

      5afbb8ed76a882765d707b6cafd218335afa64ebabeb004c92d25ab7b86b30726256d84283a1838900303138804bc866b03fc56fb6a4bd8e9c73534980b26bf5

    • memory/3032-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3032-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3032-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3032-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3032-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB