Analysis

  • max time kernel
    94s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/09/2024, 09:27

General

  • Target

    f8b5b1f753911ff962eca6a8c5c0c880N.exe

  • Size

    236KB

  • MD5

    f8b5b1f753911ff962eca6a8c5c0c880

  • SHA1

    454db94619adafb39618361ae6296e63951dae59

  • SHA256

    fd06268beac767a49b6a92fefa5ca30127297ca1a0031431010166c8a60296bc

  • SHA512

    36c9e1edfac623928ba66cd50cff41951c5a255936df211603405fbbeb95c01c53455186b9d902381b5f761f78b379d5b0bb23380cc1a3c033c6eb85f3e64a9c

  • SSDEEP

    3072:eJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/s/FnncroP9:iwDeM7iNEkgiOb31k1ECKJ/F

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f8b5b1f753911ff962eca6a8c5c0c880N.exe
    "C:\Users\Admin\AppData\Local\Temp\f8b5b1f753911ff962eca6a8c5c0c880N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-xIVODbLKDtPm98R7.exe

    Filesize

    236KB

    MD5

    d1365af88ec988e9d42826c865f9edae

    SHA1

    37acb6db88335f12a0c72ea231ea046aa91bbd66

    SHA256

    792a28d212419630240640f1609699a3fd994371a80bc703263da584ffd6a866

    SHA512

    28900fb96295262852c83898ba707e1ae0eb866c0f8251a5c6eff766f25830b6a0e5f882dd91867408187402fbc361b76d6d0c9f243cde3d1b6a81e42c8da998

  • memory/2372-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/2372-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB