Analysis

  • max time kernel
    110s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/08/2024, 09:17

General

  • Target

    74a2687120cff315c843cb75a1d8cab0N.exe

  • Size

    83KB

  • MD5

    74a2687120cff315c843cb75a1d8cab0

  • SHA1

    76b86bf2f632e76503132c006c3c6dc911d9f492

  • SHA256

    c416fd7293e9a08b79f81d18cd5fcc4f8264e352ece944e8c1a3df9ca32e9b19

  • SHA512

    1ae74d8547c2686786118184fc3b6f75638d3084d63c38c93c5253349afef0656427cc9cc5d627cc945e47c91187dde08daf5979d01236df0dc77f47529ee3a6

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+EK:LJ0TAz6Mte4A+aaZx8EnCGVuE

Score
7/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\74a2687120cff315c843cb75a1d8cab0N.exe
    "C:\Users\Admin\AppData\Local\Temp\74a2687120cff315c843cb75a1d8cab0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-aDfMsr5Ggd0JbHBB.exe

    Filesize

    83KB

    MD5

    8439eb6c6731ed4764537866a1952785

    SHA1

    c20198beed1864e9fcc5ccc0d0c90a4d8e8a1d02

    SHA256

    cec8bab965221b724e2ebb362ec339c8b019e2418e1b96a5bba3fb7e861484ee

    SHA512

    5875c708112cfea7f71ea96702fc2cfc485cf9a24bde64d3100c13b691296bcef8330fd8b65e79d61b802a2b6854092de08adf5fb07692f5b30b98788a6b1eb1

  • memory/2008-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2008-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2008-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2008-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2008-21-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB