Analysis

  • max time kernel
    110s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/08/2024, 14:00

General

  • Target

    9a8bee06337f77fc931606b564f173e0N.exe

  • Size

    83KB

  • MD5

    9a8bee06337f77fc931606b564f173e0

  • SHA1

    bcafe03023a7415693e08af978283bdce6ce6c1e

  • SHA256

    0d1c577ff9b954a15024d04d30369db9f02f15674ae582e9088dfed571acf127

  • SHA512

    532843086bb161031265028f0f5e05c2754104ac188d2811a51cb1456cb0effa44451031c8e5ed72b300a239498bd9805aadecbe8d837c2f96e5e9b77dbdd2bc

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+jK:LJ0TAz6Mte4A+aaZx8EnCGVuj

Score
7/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9a8bee06337f77fc931606b564f173e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\9a8bee06337f77fc931606b564f173e0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-t8bsHsCDj8L5xsAm.exe

    Filesize

    83KB

    MD5

    05ca50ca8ad33ba34ec33866dc465be5

    SHA1

    3abdb368b0bd4012a7c176a028b47379b9edc7a4

    SHA256

    27396c5197f0d2ffa6343a4a348a65026e547c9238b810e4fef3d89d9429abde

    SHA512

    8aa1ce1f0f48cce870913f555b94bea985225d61fd3ecc89337c92301c27d5e7c0183ae78283ebed7ef61c12bb9a2f0e752d96655a2a4faa6f450459fd649b58

  • memory/1988-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1988-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1988-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1988-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1988-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1988-21-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB