Analysis

  • max time kernel
    110s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/07/2024, 20:22

General

  • Target

    05f0e032ad3302de4e9ee6d6ae0c66e0N.exe

  • Size

    83KB

  • MD5

    05f0e032ad3302de4e9ee6d6ae0c66e0

  • SHA1

    6866a4d1f947bffb7198020f4e268caca7ac8dcf

  • SHA256

    570729ef51626167b45a0d036186b6ce71b94b5537fa9c960f14d2dad3837a34

  • SHA512

    8d609918cce9bb54393fdd7eaf06e9c351ef7fbf9e8b2bf1086befaf06b61dceea388977b4f9b0e25b9d8aaec2abaf78cf764567800063075cdabd1fd1553c98

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF++K:LJ0TAz6Mte4A+aaZx8EnCGVu+

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\05f0e032ad3302de4e9ee6d6ae0c66e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\05f0e032ad3302de4e9ee6d6ae0c66e0N.exe"
    1⤵
      PID:3876

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\rifaien2-dTFgmFjLILFWcEq1.exe

            Filesize

            83KB

            MD5

            ff4021bceb8c4d9fd1f306aa82419087

            SHA1

            a666d468168b4f2e85d3085745b61bf3bd531294

            SHA256

            163b21dd95bbbd1b00b08f39a60fd462d6b1bb39234d92f5645521eff848a0a7

            SHA512

            aa99d82fdd2902b12c44293c5eaa659c4f843141874f37ac8f3bab5e877bd65f0af88a10b7d820b4e8473e6c712612cb0630f0e724d60e1e12d03d320bbf68bf

          • memory/3876-0-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/3876-1-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/3876-7-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/3876-14-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/3876-21-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB