Analysis

  • max time kernel
    134s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/07/2024, 04:10

General

  • Target

    e5a84a601f10a16f08fcce55c484eae571b950536d143a61cce60d412c20a724.exe

  • Size

    236KB

  • MD5

    004158bec1bfb539443dd73f9c3381df

  • SHA1

    5378f53663d786846db8c567c1a713e219007442

  • SHA256

    e5a84a601f10a16f08fcce55c484eae571b950536d143a61cce60d412c20a724

  • SHA512

    a7651a46fc20ab673cdb779a809dba5c48ebf31149847a58716c92b5287a74eaaa44a06b4aabb73013514795a0ad3d75b8e296dfcd7dd0ad187ceee7e2afb224

  • SSDEEP

    3072:jJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/9/FnncroP9:lwDeM7iNEkgiOb31k1ECJJ/F

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5a84a601f10a16f08fcce55c484eae571b950536d143a61cce60d412c20a724.exe
    "C:\Users\Admin\AppData\Local\Temp\e5a84a601f10a16f08fcce55c484eae571b950536d143a61cce60d412c20a724.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:5064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-xHnsczIZzDnVJlED.exe

    Filesize

    236KB

    MD5

    4c9c04adf499cc9a0223c6f14f19120f

    SHA1

    5572946ba8649753f047ae7c61fef1c5193d2f47

    SHA256

    307359ea1ede48fe3143025d2b8c78d589911699a1f5e684dd4e5bf7da5a9bca

    SHA512

    cef915579892ee0a4a49f9e5beb506e1c493b04c1e6334f6bc65bddf443a90a5f2af37b34fc05044dcffe4f93b53fddd0050bfc6a373909ade957dfc22da3e72

  • memory/5064-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/5064-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB