Analysis

  • max time kernel
    111s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/09/2024, 22:57

General

  • Target

    1d928db520a7062ea73a1644d5695c50N.exe

  • Size

    83KB

  • MD5

    1d928db520a7062ea73a1644d5695c50

  • SHA1

    d738450e2301240683f013ecf9e47f6deff820d8

  • SHA256

    235cafe7e1fbdc4a9a2b0e98cd9d0f1b40739bd3eaa9253d518b525f1e062cbe

  • SHA512

    73bf898af498c545dc55fab5b2aa1cbbd09694695a089f6f58b5caa816075ac9829be1d50499236bbb9dc2f8155019c1c62a1bdbf037463cefda807aba07493e

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+vK:LJ0TAz6Mte4A+aaZx8EnCGVuv

Score
7/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d928db520a7062ea73a1644d5695c50N.exe
    "C:\Users\Admin\AppData\Local\Temp\1d928db520a7062ea73a1644d5695c50N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-rrIEKUhEycMWVeq2.exe

    Filesize

    83KB

    MD5

    60f2c42a0f8db3b2e8d6022f4595f1a3

    SHA1

    d0fb2449bbb53d985bee7cac9187da3e6c2bd7d9

    SHA256

    bb1aebc19008c6acfd0cf7133c84b5dc78f7a171140824d517574d1087b17c19

    SHA512

    4593881e3b9e542ecf9f2b5b2e84d275b46e93f74aa05e0adcb725c20feafbb92824880676d1b265291d246096d3880292018a7080a7a214c03c229abb7d69f4

  • memory/2392-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2392-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2392-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2392-9-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2392-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2392-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB