Analysis

  • max time kernel
    92s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2024, 12:24

General

  • Target

    3e1b6c7276c0b28f7cc03b37f298f000N.exe

  • Size

    236KB

  • MD5

    3e1b6c7276c0b28f7cc03b37f298f000

  • SHA1

    f633aa3111068f1ac637c40da084880d9323c25e

  • SHA256

    4ed4605cc1b4784ae9beb1bbd04a2f654825c17d7103b0c393523ddf88b6b194

  • SHA512

    e102cc6b6bfafe2fdb913ffa460f716806f2478f3c157427f4f19bad53bcb31e97867a3d4071448bf3039fb5c598bea3a4cb1d719e9dfd826bd9d9afa22e35b4

  • SSDEEP

    3072:zJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/V/FnncroP9:1wDeM7iNEkgiOb31k1ECRJ/F

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e1b6c7276c0b28f7cc03b37f298f000N.exe
    "C:\Users\Admin\AppData\Local\Temp\3e1b6c7276c0b28f7cc03b37f298f000N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-5ZnEqgApVKrtuArz.exe

    Filesize

    236KB

    MD5

    657396b9276a7fd9977d2d4f21c71a35

    SHA1

    09cd49cce05bdabf3291cbdf8478f1ae27f15d87

    SHA256

    df7bb80d4566c951d9691f795f644671919342af5e5519f82137875f5f292798

    SHA512

    1b141460d9eb609025ed123282b525d3da76d2efa28caffbcd3c17703c1c9e5a91a4635ed4625a25f57e48731b190d64e41f17f6f88ef47d41f097ed1bfd98ae

  • memory/2780-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/2780-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB