Analysis

  • max time kernel
    111s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-07-2024 15:59

General

  • Target

    df939f318d72b92f63aa05be21af2c50N.exe

  • Size

    83KB

  • MD5

    df939f318d72b92f63aa05be21af2c50

  • SHA1

    828c57e695de5469d7b3c53911abd9c9b5cf1a25

  • SHA256

    0b34fe080cc2da21ddee2fc7e44c68b6bb87ce9e77abf2baa7526e15e13b3de0

  • SHA512

    664b4790afe0ec8b7c4c66b0f6ff7f71b202e25b6cbad0362feb6dea6bf86f1388c75387cd74907d2474422f8faef89c3f746a669d119a0fd9f6c635e8d6c149

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+4K:LJ0TAz6Mte4A+aaZx8EnCGVu4

Score
7/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\df939f318d72b92f63aa05be21af2c50N.exe
    "C:\Users\Admin\AppData\Local\Temp\df939f318d72b92f63aa05be21af2c50N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-Ojwy4lMhChwPPvD5.exe

    Filesize

    83KB

    MD5

    cf06c68749d86d323f928d4720ef2105

    SHA1

    ce4243ea0a07f2f2e1bff0ccbf5c029b21a38fd6

    SHA256

    7993a5e88c842551f8bff35ae01f51d962641a8d61d2b9f2253db1ef74ec6c2b

    SHA512

    3724413a1b55c2939cf34fe880ddeaf8946376ed7234ed9a38596afce150f808e5e4a18fd03c241c3747bc62a3467e3cfe44ae9cfb90949f297eb200d742299a

  • memory/4604-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4604-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4604-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4604-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4604-21-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB