Analysis

  • max time kernel
    94s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/08/2024, 20:38

General

  • Target

    023be8cb357d854c8df3c200a8601110N.exe

  • Size

    236KB

  • MD5

    023be8cb357d854c8df3c200a8601110

  • SHA1

    c99042d452c8cf3206b313c927ef9b3c6b6e83ec

  • SHA256

    6d1d443bfc9fd96e3771acb992194f7985513852bc97583f6aabbbcb7344fa77

  • SHA512

    a70673d7aabc809c5ac4a40eb26e6c3787fd6ce1c5821916507bd21cdea1955dfb1e2e95d4dd86cc43738514ff01b175684265096fd3e7a7e9d37d4d30cf9a22

  • SSDEEP

    3072:tJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/O/FnncroP9:XwDeM7iNEkgiOb31k1ECgJ/F

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\023be8cb357d854c8df3c200a8601110N.exe
    "C:\Users\Admin\AppData\Local\Temp\023be8cb357d854c8df3c200a8601110N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-a6ZEOv8DjUok37Ia.exe

    Filesize

    236KB

    MD5

    5fa95f757d19c2d5d6180aa26e1b8765

    SHA1

    34aba8383c49c37582d8164b90b39f996a40b74a

    SHA256

    8dc6ee9c77f52338ec6518719a7a2522da7e22935503b220fced6acdc21611c4

    SHA512

    035edd621bfbb888cd6f46f7c375e69ac7669622f034c1d4b48422bdf3144ef6ac4f2f370b0a368699458adea428fee6533269d37548b4eaf8f7896feed8f1b0

  • memory/2376-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/2376-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB