Analysis

  • max time kernel
    103s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/08/2024, 10:43

General

  • Target

    70adf986432dfefe72ef8af8e184c320N.exe

  • Size

    236KB

  • MD5

    70adf986432dfefe72ef8af8e184c320

  • SHA1

    4e4bc9eea0b78cf6cd4d303f2c1147518ebdb9ad

  • SHA256

    45391004c946a23b6bfcf1636169e38684b9a241c621e23b0f471975266a5699

  • SHA512

    8d96746266bc37317b7c252aca0d1d9442fa601d7fcf3ccb307f51d33a3da6655f9cfa9637a4cac828ca99fcc0a8fd847eefe7409ad5c6dbe4a86441c40af04a

  • SSDEEP

    3072:VJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/c/FnncroP9:fwDeM7iNEkgiOb31k1ECaJ/F

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\70adf986432dfefe72ef8af8e184c320N.exe
    "C:\Users\Admin\AppData\Local\Temp\70adf986432dfefe72ef8af8e184c320N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3216

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-A3gYg1Q8FbRoenRT.exe

          Filesize

          236KB

          MD5

          12d932f99b2f67b77fc537ca88f69032

          SHA1

          8ef9fa2a99c076bdf6be7de0e5b8cd24a017b2cd

          SHA256

          eb9684499c6f3048fd514accd48f447d0865c019f1395938e0ec4de1553c8d20

          SHA512

          a93e80c7525f2cd2ecd901a58e1a57d4a4091125e54a844dd42d2d06c0b2f27767b1df3ad71a2cc59daac6b4d248fe617240bd605ed5cd17b369c8c0d8466a10

        • memory/3216-0-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB

        • memory/3216-1-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB