Analysis

  • max time kernel
    110s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/08/2024, 07:52

General

  • Target

    45ad8661ed53b385d2dbdb86fe9f9e80N.exe

  • Size

    83KB

  • MD5

    45ad8661ed53b385d2dbdb86fe9f9e80

  • SHA1

    45198a32336859f9a6ced85a1a82c50f6670f18e

  • SHA256

    0912f149cc8c98ca080c6363744c2939825d547e00a83971c075daec951aab4c

  • SHA512

    2848ece3249db719fa825785ffa0fb20ebd3335bb47f6562d965cd625dc4c61ee5a306aa9000a790bced17ca639377fff6b0b54c547edd9370d0d4cde8c7f3c0

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+YK:LJ0TAz6Mte4A+aaZx8EnCGVuY

Score
7/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\45ad8661ed53b385d2dbdb86fe9f9e80N.exe
    "C:\Users\Admin\AppData\Local\Temp\45ad8661ed53b385d2dbdb86fe9f9e80N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2228

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-Smp3zxUMzgP5O4Cl.exe

          Filesize

          83KB

          MD5

          7c162b47f0c64f3dbfa36f2309b8a482

          SHA1

          ce2d7021d7ae56273616d18855da023cd946badf

          SHA256

          69e80e63ad4cd9fdb57176be602fdf6c05fad807418399548f82042171fd3cd9

          SHA512

          08c8c29c1d6a80c21dc90520a26e57c6cd06bd263c4bbdf5540d1f985a503527210b1ec6e096f297c9dd2ec97247ae2fd3f2850547b878777f877bd201d0bd62

        • memory/2228-0-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2228-1-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2228-7-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2228-14-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2228-21-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB