Analysis

  • max time kernel
    111s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-08-2024 02:22

General

  • Target

    d53650bdb947f6935ee49207126e6c80N.exe

  • Size

    83KB

  • MD5

    d53650bdb947f6935ee49207126e6c80

  • SHA1

    e7f4a37ca69ed4a50c94862fa003f8fe15433212

  • SHA256

    381510521e721941898d35e53f4577634be2b1211d4804456a6919f803988e2d

  • SHA512

    3a73c5185eca063c6015bb0586db34be81de94ead03419aac8c840608b00b0dd0f7250c34ffa43a404102d6c6444ae319ba64f584e40cd7f1afce00253ee1009

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+5K:LJ0TAz6Mte4A+aaZx8EnCGVu5

Score
7/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d53650bdb947f6935ee49207126e6c80N.exe
    "C:\Users\Admin\AppData\Local\Temp\d53650bdb947f6935ee49207126e6c80N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-8TV7xwL9k8g4Zb0A.exe

    Filesize

    83KB

    MD5

    fa86c0050cb5f7d78e6ca7e2e94c207b

    SHA1

    ba80e44354a3c7c525971efe4c27bd73bf944a94

    SHA256

    5aaf49257485f93bcd59e78b34aa7005e72891a6e3d4ab99d93fb67eaa156a18

    SHA512

    3b7988786528ffe12d0f8c83e105fed06614a546c3c946f06622a351854554c33ac61043b02ac34f46707367c0287d09df2f469b5a7487c25b2ef8a1be8a682d

  • memory/4928-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4928-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4928-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4928-9-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4928-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4928-21-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB