Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22/07/2024, 05:01

General

  • Target

    639ac8052baee69cb02103f48aa243d0N.exe

  • Size

    83KB

  • MD5

    639ac8052baee69cb02103f48aa243d0

  • SHA1

    a0486b50e16885dbd3f610c9c96b1d6d9d0b489c

  • SHA256

    2b1f722cb9ddd337ffc6cf47dda2ee8974f63ddf8243c9a71f1bdc7dd614f257

  • SHA512

    dfbe7e615b0d232e1dd40722e194fe771f0a43ea5b70f217048ba399216b85f5eabc419f4b11b1e563c6069976fee59e7d543f6354f8688b317d532849f1d6be

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+sK:LJ0TAz6Mte4A+aaZx8EnCGVus

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\639ac8052baee69cb02103f48aa243d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\639ac8052baee69cb02103f48aa243d0N.exe"
    1⤵
      PID:1208

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\rifaien2-9xhbSHgs0G4FP4ZH.exe

            Filesize

            83KB

            MD5

            87cf314b38859ca7306b4c18320f88cd

            SHA1

            2ccfd18b0547894e13e8b8419cd45fff91983050

            SHA256

            421b62331d069c676865df7fec149f370e63241ede80ac8249b5339ba84170e6

            SHA512

            23a98cd204c94143c66ecdb6d1c5324f2bb8e5b456cb99b8400fa18a5008fc500c60f2ae0e8338c45c6131bd6a09b548b56e869cd7dfd920abc50788055a0d30

          • memory/1208-0-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/1208-1-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/1208-7-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/1208-14-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/1208-21-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB