Analysis

  • max time kernel
    103s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/07/2024, 21:20

General

  • Target

    0bb64a19c83365b707ed7978324c9f60N.exe

  • Size

    653KB

  • MD5

    0bb64a19c83365b707ed7978324c9f60

  • SHA1

    85ea00b66f15469acc0d2de7ff1863aadead59b8

  • SHA256

    eea34c219b6654fae05719b5a02961df8214e0409930148304e4ba1a97897c45

  • SHA512

    fada06b335d793361998192dc347b25874cdce54b0f9bbabaed969d807195d0023d870f2191c31dc9d5097f091e76e93759a5df7a927e1aa1fe744244bcf6ef8

  • SSDEEP

    12288:kbQ06/iIb7kcUV6PwBicPeyqA9pULZR4c1JCgZq5bwbPhk79ZCGDFU:k8YIb7kbiGem9G4kZqiC5ZCGu

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0bb64a19c83365b707ed7978324c9f60N.exe
    "C:\Users\Admin\AppData\Local\Temp\0bb64a19c83365b707ed7978324c9f60N.exe"
    1⤵
      PID:4012

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4012-0-0x00007FF60E3A0000-0x00007FF60E7C2000-memory.dmp

      Filesize

      4.1MB

    • memory/4012-1-0x000002203EEA0000-0x000002203EEC0000-memory.dmp

      Filesize

      128KB

    • memory/4012-3-0x00007FF60E3A0000-0x00007FF60E7C2000-memory.dmp

      Filesize

      4.1MB