Analysis

  • max time kernel
    112s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 02:26

General

  • Target

    5812faeea1336c75c09503a9cb6ba800N.exe

  • Size

    83KB

  • MD5

    5812faeea1336c75c09503a9cb6ba800

  • SHA1

    0c135927b2bb830634cbf9a098c4488b91daf88b

  • SHA256

    abd4a3d7efd434da1c604450620a13fcf4058707bf5da828ab550f70334a74f6

  • SHA512

    e3dc99983125bdae41b81f4ac67ec98f9f54f148e4700bcf1bbd0d202c858bcb5e7bb2060c7088bf9cdfb1730441d0f2b419f0811531c1c45bc6b659756bea9f

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+7K:LJ0TAz6Mte4A+aaZx8EnCGVu7

Score
7/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5812faeea1336c75c09503a9cb6ba800N.exe
    "C:\Users\Admin\AppData\Local\Temp\5812faeea1336c75c09503a9cb6ba800N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-fhfSqxgAOZSs52t2.exe

    Filesize

    83KB

    MD5

    31b325bc0bcbfc8bc029e20fb267e590

    SHA1

    5f0b537e3ac0a7c2a5063de058758998f0f43bbd

    SHA256

    c1ca93ad934a116c38cef6f38f2232d14de2372bb31f885069698abe382ea088

    SHA512

    61f538469dfd9e1f1d9e17a0e6bc8853a983b50a57c2bf8544fbaac9e79d06e3b58f7085da76872ae4e3288addd89c949d6073c6c53610427001206dacf452ce

  • memory/2504-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2504-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2504-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2504-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2504-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB