Analysis

  • max time kernel
    102s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-08-2024 09:43

General

  • Target

    c223742ec9675d4174a46616bd8fcb10N.exe

  • Size

    65KB

  • MD5

    c223742ec9675d4174a46616bd8fcb10

  • SHA1

    83a4c9c603831ef1cf6fb08e99fae8d1a983fd6d

  • SHA256

    adae8ebf8a54d9a5c7678809bcef992b0b7ce2fad69d8f76fac3f1d2a204b621

  • SHA512

    63917b01c8750bcebc10daf123f7b0b20685ed80dfde4c857ca9958c8107bf76a23013716f57f1c0c157498d8e3f0cc2394150797e1fc93647b72e76713a14b3

  • SSDEEP

    768:ErzL2iP0n1gMLsq2DwXfisMeNgBMi3Hm/9FLxLQdKhrsTdz4/qXxfF8F/sWgyg:EPMLZXfXfG5m/9RxL+ish4iXxv

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c223742ec9675d4174a46616bd8fcb10N.exe
    "C:\Users\Admin\AppData\Local\Temp\c223742ec9675d4174a46616bd8fcb10N.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    PID:1408
    • C:\Windows\SysWOW64\rmass.exe
      "C:\Windows\SysWOW64\rmass.exe"
      2⤵
      • Executes dropped EXE
      PID:2660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\rmass.exe

    Filesize

    62KB

    MD5

    fb6762ef73671ae00c22eb2e0a3eac20

    SHA1

    851665977cecca8bfa00f8089c2a7a72a1b30af6

    SHA256

    9a4829214f523e107108ca496af4eeb66b123f87d25b87e3c288ba140807d74d

    SHA512

    b3f9929e3e6f3a988deab938d8ae6942f7ff70cc89be53221b73464a5f5fc67b901cad96840aaaa058764550746030ba9d015570b21234cfeaa49b0e038cf7f5

  • memory/1408-0-0x0000000077282000-0x0000000077283000-memory.dmp

    Filesize

    4KB

  • memory/1408-5-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2660-4-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB