Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    30-06-2024 18:27

General

  • Target

    07d1472e0e4a6dde466c45c43f478784c76a4406f3db66995b3b7b4f4b652ec5.exe

  • Size

    105KB

  • MD5

    a10ae788f0cb230b6a271a03278692a0

  • SHA1

    f0538ca316da2b1555e438e7d0f041668060e411

  • SHA256

    07d1472e0e4a6dde466c45c43f478784c76a4406f3db66995b3b7b4f4b652ec5

  • SHA512

    b42fe9ad8f1c212041c14966d49ee976dcb70b870631fb712463d106c40e2f6aa8c456d200a1b219a4c4f6749469a3bb4a9fa04d6d9a7b760ebd6567fad29c15

  • SSDEEP

    1536:be1+PsRuRfDOyMsqGvq3ogaI/n01l6zUhOq2qDYjVCCizbgECnpE9+eV1gJ:bpURuRfDO+qKq3oga1qQI8WVC9lF9X6

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07d1472e0e4a6dde466c45c43f478784c76a4406f3db66995b3b7b4f4b652ec5.exe
    "C:\Users\Admin\AppData\Local\Temp\07d1472e0e4a6dde466c45c43f478784c76a4406f3db66995b3b7b4f4b652ec5.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2424

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2424-2-0x000000013F9E0000-0x000000013FA16000-memory.dmp
    Filesize

    216KB

  • memory/2424-0-0x000000013F9E0000-0x000000013FA16000-memory.dmp
    Filesize

    216KB