Analysis

  • max time kernel
    110s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/07/2024, 18:04

General

  • Target

    e872f1b0dd1630866dbdadbd92a4a5e0N.exe

  • Size

    83KB

  • MD5

    e872f1b0dd1630866dbdadbd92a4a5e0

  • SHA1

    80d02ecd0e90676ec4ec2de1aed052ef5b3d1b9f

  • SHA256

    d5abf817c067e25db52132372fe49392e00c6e0c2c889a58f378e8cee5297ae1

  • SHA512

    a4c1f97dc0fd711f2065ca0527fab4abf98e8a42672d405eacd5820195fb29410aab7701e2e90ef2befeea44616454a52af105a56f98dc147efc1421660d5ad6

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+vK:LJ0TAz6Mte4A+aaZx8EnCGVuv

Score
7/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e872f1b0dd1630866dbdadbd92a4a5e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\e872f1b0dd1630866dbdadbd92a4a5e0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1960

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-dzCD4tf9FlfFRa4y.exe

          Filesize

          83KB

          MD5

          9f8d4041a356539c6da6acd981b70d04

          SHA1

          668f9dd4ef17884bfee75e65dc3c1aa5c71b582e

          SHA256

          d44992730e3232aac08cf81bca8ed8827a97652c4dfea1a2c4c1c9155f10f18a

          SHA512

          39b992112c7b4b9d9af315157e72baa1ffd67a5236ab0453e4482c2f334556a032d345d9f7ac19787be8a18ecaa263801ab6f0d7c579e49b1200763b43f971e5

        • memory/1960-0-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1960-1-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1960-7-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1960-14-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1960-21-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB