Analysis

  • max time kernel
    91s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-09-2024 15:39

General

  • Target

    c51cedd630f3ca339713ec86bd9d9000N.exe

  • Size

    236KB

  • MD5

    c51cedd630f3ca339713ec86bd9d9000

  • SHA1

    919f64943e8c2cfdc8d482b7b8867b48f083fde0

  • SHA256

    3f613abb72b0e6409a6b593048a2e5f8ec3b5adef80450cfb456f9edaf299feb

  • SHA512

    edc4e7ee2602c32103b2182a197b72838b96a34009d3b49ac3dee93565e224c0adac0e63c04631656a44d83878ac95cbadb9b5aa3dc456559859d01fcc640664

  • SSDEEP

    3072:YJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/C/FnncroP9:cwDeM7iNEkgiOb31k1ECkJ/F

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c51cedd630f3ca339713ec86bd9d9000N.exe
    "C:\Users\Admin\AppData\Local\Temp\c51cedd630f3ca339713ec86bd9d9000N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-TgdFkrTZJtd79oyu.exe

    Filesize

    236KB

    MD5

    35147eba50be62331096cdae4621a335

    SHA1

    9807215804a4e63bb1bbc1e6a3f2bc9bcc71776a

    SHA256

    4886927d57b42c04fadbcf8f0fa5297729b9e562b394ec63a083fb534ca47346

    SHA512

    d0c2c21d0ea2ef205fa220b8bd5443bbc336d5b9e8f5ae300351e09c386c36e22bbd716fad08e763e254c27c0a8e46f70b766e7fc229f6c1bd2f69338e0a5280

  • memory/2548-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/2548-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB