Analysis

  • max time kernel
    103s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/07/2024, 21:13

General

  • Target

    0e4af5aad1f9ea32713c8434ec803f20N.exe

  • Size

    220KB

  • MD5

    0e4af5aad1f9ea32713c8434ec803f20

  • SHA1

    bff43b855c6cc33199f72554a6935d7c9a59c70e

  • SHA256

    e7d3ab1df95f93517b1b482ef9c04c8457a295aba4664a9b4457c7698907de05

  • SHA512

    2b30eccf32a54813505e107fe7cef4cf6a9ce30a459703423e45c81315e085e0d32e6f21bb9f95b7ebd5598135e1189ec9929c868facc398b881e65311f98f60

  • SSDEEP

    3072:07xOJb2kN3RDi/U8BG2Jk50LTub0FGH6AdGKbyTNFVyKtaAmx:OsnzRJbr6B

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e4af5aad1f9ea32713c8434ec803f20N.exe
    "C:\Users\Admin\AppData\Local\Temp\0e4af5aad1f9ea32713c8434ec803f20N.exe"
    1⤵
      PID:1704

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1704-0-0x0000000000400000-0x0000000000437000-memory.dmp

      Filesize

      220KB

    • memory/1704-1-0x0000000000400000-0x0000000000437000-memory.dmp

      Filesize

      220KB