Analysis

  • max time kernel
    91s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 05:04

General

  • Target

    e4aa0068bd053253ea5cf3a3060f457c52f7e61b72d28fbbdad8ff8a1816644dN.exe

  • Size

    236KB

  • MD5

    c5c492f9942512e26a72fce83f882020

  • SHA1

    979015cff774f7b38db3d0710fa0cb1beef9a952

  • SHA256

    e4aa0068bd053253ea5cf3a3060f457c52f7e61b72d28fbbdad8ff8a1816644d

  • SHA512

    cecab93c3e3baeee0c4907d9566631bfb1600849dca03bb3b88d74f801a60906f34eb78227a695f2c4687af58dd42ffbdff2ac84160e383ea2dca703ce828d8b

  • SSDEEP

    3072:AJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/4/FnncroP9:kwDeM7iNEkgiOb31k1ECGJ/F

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4aa0068bd053253ea5cf3a3060f457c52f7e61b72d28fbbdad8ff8a1816644dN.exe
    "C:\Users\Admin\AppData\Local\Temp\e4aa0068bd053253ea5cf3a3060f457c52f7e61b72d28fbbdad8ff8a1816644dN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-PfBriIprL7GQ9hx4.exe

    Filesize

    236KB

    MD5

    cebf520fc8e3de7b70044bb3b2ea216a

    SHA1

    d5b88fd845fd6b79ddb438494ba759e7b59f1805

    SHA256

    39f0cf7838d821d1b7f5df09bea66e99f3054bb969d682d45a9c290441d3c9e5

    SHA512

    b0455bdab64386e1a7e2ddf2220ed91f851affc8c757008b9335c7e68aaf4f76ae148dfbf45a25be96f4ab735b10c52923091bb9b0730f7b097388a3cdb0d53b

  • memory/3192-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3192-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB