Analysis

  • max time kernel
    114s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-08-2024 15:23

General

  • Target

    c54c20922a037b943416978b559f73f0N.exe

  • Size

    236KB

  • MD5

    c54c20922a037b943416978b559f73f0

  • SHA1

    0c65c5e7c240c2fe6690cd26345cc791b729321e

  • SHA256

    b6a7ebe112fb7ddd7dc8c449a6be1ba87b38ec6be65fdd1bcae020eba202c252

  • SHA512

    12014b733430d82029217229e13a67f39d5253e01988d4dfc976e9e5b682c5c9b023603c2e582df3d64a574f2a147ca4ccb55970ad4126b81a5462319df39261

  • SSDEEP

    3072:7J0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/d/FnncroP9:9wDeM7iNEkgiOb31k1ECJJ/F

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c54c20922a037b943416978b559f73f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\c54c20922a037b943416978b559f73f0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-ktHhtHX2q8tvzg0M.exe

    Filesize

    236KB

    MD5

    bec33a54b970126c8a3289be9fdc137f

    SHA1

    0fc46c6e3f666c18cd50c4e8950f418dee5dd3fd

    SHA256

    3fc6723dde2adc3962500a758a183651dc2e76500d77bc53fe4339b0d788ae5a

    SHA512

    60027b51d6ca4d5f805536ff17731d4be294e171f3c2bda054d2df871ea695d38645827fdd5b5ddd1ef4c86cb668986ab7d2c90a3af8ee4ff6ba90b61a2145ad

  • memory/3360-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3360-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB