Analysis

  • max time kernel
    120s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/07/2024, 04:43

General

  • Target

    929a63b01bf9727164d5c40672064c80N.exe

  • Size

    83KB

  • MD5

    929a63b01bf9727164d5c40672064c80

  • SHA1

    3bb6a19e60e1fe871b41c01668b82c6c9ecf755e

  • SHA256

    288af20ca1b6e854ff5c70d185ae82f38e9944b25b6eb4ff6c9e35290700d209

  • SHA512

    eb557b437c75df12734556a4f67a56405b44b6e9262435c620a3c8c549010f32c4cdeda018991a7538fea00867b645bdec4523ed8515ca0541d8663fb9eff067

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+eK:LJ0TAz6Mte4A+aaZx8EnCGVue

Score
7/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\929a63b01bf9727164d5c40672064c80N.exe
    "C:\Users\Admin\AppData\Local\Temp\929a63b01bf9727164d5c40672064c80N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-G2rF0n8KhqpWss41.exe

    Filesize

    83KB

    MD5

    4d17e8fe1c3916f52f239ff11ac17934

    SHA1

    44abef48cbb3686562aeb4545d514fae921e3fb4

    SHA256

    860d71b546ad3c3c2e948425ce2a7bc13874e53438589635e3fe469b2599b67a

    SHA512

    75acaa87bef7afb782b2946c21565b96b7b4da83b8dc9599f2826bc8da831e7195a8a5eab4ff257edc947c687741622d94077dbf3328e59c170f9a60a091cded

  • memory/2196-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2196-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2196-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2196-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2196-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB