Analysis

  • max time kernel
    120s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 05:26

General

  • Target

    8faa2cf2664cb74b4043e046df3193cdf9b56d9c2ce76d08c2b7b690179663d7N.exe

  • Size

    83KB

  • MD5

    19712214b49abd67960f78251944a630

  • SHA1

    58eff35bea2e98eb177a8e9408867c2c79e607c2

  • SHA256

    8faa2cf2664cb74b4043e046df3193cdf9b56d9c2ce76d08c2b7b690179663d7

  • SHA512

    4346eceffa6d6348c5391b8d1235cf59ccc34b6dfc8d2a2e8266405f486850ce548244d8ec67a913649727033c023c2bad1f412e82b7de33379531ce3287cf80

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+JK:LJ0TAz6Mte4A+aaZx8EnCGVuJ

Score
7/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8faa2cf2664cb74b4043e046df3193cdf9b56d9c2ce76d08c2b7b690179663d7N.exe
    "C:\Users\Admin\AppData\Local\Temp\8faa2cf2664cb74b4043e046df3193cdf9b56d9c2ce76d08c2b7b690179663d7N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-sjNsvYkMqfyce3bD.exe

    Filesize

    83KB

    MD5

    6128dfc1280dd3cdcfda423bfcd8a821

    SHA1

    2dc3f3694c63fcadcf22065ebdc15b394003f3ac

    SHA256

    22a92ae142bc32f320be0d5b73e7931fb0fbc14d74a3e7cdb9ab11769f73ecc4

    SHA512

    a5dabcdc03a6882b4d671ec60d08b7b48cfb2f061e8101287350613463bb2c326ab0dcf77fcd6876edc57c1f28aa81f421c16c7c015c35bd8e2788cdd4709745

  • memory/3768-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3768-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3768-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3768-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3768-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3768-20-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB