Analysis

  • max time kernel
    95s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/08/2024, 21:00

General

  • Target

    43717c1071b89f81c23ff83cf8f10b9f7611e06bc467817e61408d090a19304b.exe

  • Size

    32KB

  • MD5

    8c87117b56e78a95a4b19db718d01891

  • SHA1

    2d43aa503e9c2801cb402bfde61f327a02f9b0fc

  • SHA256

    43717c1071b89f81c23ff83cf8f10b9f7611e06bc467817e61408d090a19304b

  • SHA512

    598a7794115cd1b6237fbbe344f4f1544e7902a5e16c182b0aa7d71474d2d3acfa0fe583ff7fb47def780f85831196384027c407b0f13fbc6da877f12f072505

  • SSDEEP

    768:ITRfpN0pOy3OzeXmOGXbJOlB2vsLCik5dAy7b6lS2d44:IHzzeWHXbJGB2EOik5h36lB44

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\43717c1071b89f81c23ff83cf8f10b9f7611e06bc467817e61408d090a19304b.exe
    "C:\Users\Admin\AppData\Local\Temp\43717c1071b89f81c23ff83cf8f10b9f7611e06bc467817e61408d090a19304b.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\My Downloads\KaZaA Media Desktop v2.5 UNOFFICIAL Full Downloader.exe

    Filesize

    32KB

    MD5

    163c9130e692d6a996259e684f4aa273

    SHA1

    1376fc6cba469b6e6df14338880f23adcae2a87d

    SHA256

    e461ae9087dcdbf815237df1c05b94cad829aeecddc7d92393578cf4f5c82e7c

    SHA512

    93b9e1d135b80e1916f36d807ad815db9d7a3f88f5b27132ce5dd8d1107851751e7f20aec2fc39460a52bd55a10ae97437696f7ef6d91d5dbe47741c46f1a232

  • memory/3784-0-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/3784-101-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB