Analysis

  • max time kernel
    110s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/07/2024, 06:26

General

  • Target

    7bfe52e38d59697370960ff1873b6490N.exe

  • Size

    83KB

  • MD5

    7bfe52e38d59697370960ff1873b6490

  • SHA1

    a0b56766b088ca8f2d1d384ed7e587b3005cd3a7

  • SHA256

    78c058c4ef6338259024bb1860eac298706b6777887c6ec8389b365d88e90659

  • SHA512

    1e81daf3c7e17fb8e002befc533ba858ff4f6b3cfad3b3b9ee7b3e6bf80f07c00f217a82a099b07fcd84be4db66ab2453089039bc842ffd7e3ed7f7f27db5571

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+MK:LJ0TAz6Mte4A+aaZx8EnCGVuM

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7bfe52e38d59697370960ff1873b6490N.exe
    "C:\Users\Admin\AppData\Local\Temp\7bfe52e38d59697370960ff1873b6490N.exe"
    1⤵
      PID:3272

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\rifaien2-n0n2CnbSOjvrM5vY.exe

            Filesize

            83KB

            MD5

            71288e251774e705d623562bd83c3949

            SHA1

            e1ef91d5c5ef5eb5568fa2c0224f983f1732045c

            SHA256

            851b87c7beef041e275a3f78d5df9231a79fbf5438bf3232222d0cb29820b03e

            SHA512

            c527a316e43ebf840d925f52768ce9b2da88b757fd6f881361d142d4fdabfa9cc2f4de0b509f2c533f82f058a7c6e30e5cee416a7e69f2375e530e3ad168dec1

          • memory/3272-0-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/3272-1-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/3272-7-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/3272-14-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/3272-21-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB