Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/08/2024, 07:05

General

  • Target

    6ec3301eef1bd70332a947d59a4d3950N.exe

  • Size

    236KB

  • MD5

    6ec3301eef1bd70332a947d59a4d3950

  • SHA1

    d6c3101f8018e604466f1407e26feafde43d37a4

  • SHA256

    7f151cbd115831c819d7af906ef47ce1f7a8bc40f62e6d10e49ae8c690b1e13d

  • SHA512

    a3865b66dbb03b83111c0d920d25981dfb8937fb193e7be4821dd015544eca09fbd5fe6a5d9d17c88d033b13d6af61720a8c0ab841f56e213fd0310ddef83f6b

  • SSDEEP

    3072:wJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/C/FnncroP9:UwDeM7iNEkgiOb31k1ECUJ/F

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ec3301eef1bd70332a947d59a4d3950N.exe
    "C:\Users\Admin\AppData\Local\Temp\6ec3301eef1bd70332a947d59a4d3950N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1348

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-4NkHy1R6OkGLn3UB.exe

          Filesize

          236KB

          MD5

          d6396951ed4a6eee13dacdb540d00c93

          SHA1

          20073f5c69cfe7f3cf045035e75766ede1dc8efd

          SHA256

          0e7e8c43a662843d1e43c746dd17fa1752f67c6e9df044ede63b2e0a57ef1035

          SHA512

          2c2acc64a5014edce585d38241505721a141830bf150a61e4f46d86ff60e1713b7f20dc092685cb47a386ecd35cdb0b63099b1619178a7a25be374034d7bb4c1

        • memory/1348-0-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB

        • memory/1348-1-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB