Analysis

  • max time kernel
    111s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/09/2024, 15:22

General

  • Target

    50c0795077610443526bd512dcb63a10N.exe

  • Size

    83KB

  • MD5

    50c0795077610443526bd512dcb63a10

  • SHA1

    fafc46c31c113ac59ec5ce0d211fe5180ca216e9

  • SHA256

    d27339611fa414df64679488763b368f37b0c3f56434ce3eb8519b83fe02e38e

  • SHA512

    f025981c7f5dc5be33ce605dcb559f6b21b7abbed4b7e72b1ec0c5f043fac68e43293222fdbdc7970d6e140a8fa6772fb71aa86b516d09eb8b281656c48f87de

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+rK:LJ0TAz6Mte4A+aaZx8EnCGVur

Score
7/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\50c0795077610443526bd512dcb63a10N.exe
    "C:\Users\Admin\AppData\Local\Temp\50c0795077610443526bd512dcb63a10N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-spf7gjX2Qjo7HKWF.exe

    Filesize

    83KB

    MD5

    b8bf2d462a29d2b73f7780fa2c8451bc

    SHA1

    52d048247c11ad00be1eb4cec354970249bb585c

    SHA256

    b0d08859bb29bd0abe96adc74d5ebd1951c6fc595aa8a4c303c6078e6d6df6ae

    SHA512

    bb8a2ee39b39034c0b83b7c5f98a70e8efcf54485a99c3b092faad7517f081c3a59ad691529368a9c8fb1bf6e97aea82bd2866a502448946173a151d301f3a3a

  • memory/2252-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2252-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2252-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2252-9-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2252-16-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2252-23-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB