Analysis

  • max time kernel
    120s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 04:53

General

  • Target

    8cfee3214ba411ffc1005645c9714aedecb14457c2da62a8cb90a22b91618d16N.exe

  • Size

    83KB

  • MD5

    a8be3c77554666be8a01a7d8b3cb9530

  • SHA1

    5b5da30b2311046c644d02267bc5f477639c1206

  • SHA256

    8cfee3214ba411ffc1005645c9714aedecb14457c2da62a8cb90a22b91618d16

  • SHA512

    dca15e383fc1a81ea686b9cd06d8a822646a4ccd14f9632bce019b4e83752f20478496b9989536f902a615f1f28dff36abde22147d5ebb7dc5030c26c246de03

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+dK:LJ0TAz6Mte4A+aaZx8EnCGVud

Score
7/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8cfee3214ba411ffc1005645c9714aedecb14457c2da62a8cb90a22b91618d16N.exe
    "C:\Users\Admin\AppData\Local\Temp\8cfee3214ba411ffc1005645c9714aedecb14457c2da62a8cb90a22b91618d16N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4132

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-kpNhOdhXiOozwfzU.exe

    Filesize

    83KB

    MD5

    9c9e7984effec366ff77ed2a497fb42d

    SHA1

    ffa6a84eaa7bd5f98fbc193604850cc01b21a5d8

    SHA256

    d33fa6c51728508b470e5e8369f1f4a90d9866803df6f54ff84c3d5344d86106

    SHA512

    3437b6b1d4c6915ff5476b10f40a97ca676c1a3250a3fc595d0e6fb321ff0fdd418bd65f26700d9fb7be6d2eee4c246f9b6d5a3930888636aced30c3107fcc3c

  • memory/4132-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4132-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4132-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4132-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4132-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4132-20-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB