Analysis

  • max time kernel
    111s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 06:22

General

  • Target

    f7c698031738116fc97d34997ee9023c895cd172cf79807758d7609548a85457N.exe

  • Size

    83KB

  • MD5

    84ff1caf133e353c44dd188766d3e5a0

  • SHA1

    eb328c7e0d50edaa4825560697036b9fac9fce62

  • SHA256

    f7c698031738116fc97d34997ee9023c895cd172cf79807758d7609548a85457

  • SHA512

    2daf518f826f0510f4f78fda01e1474eb5c64a4e8c693e1c3a64b19687d08a447664d62c7886c90b0f2f21a3d1f0f43755e27a85138121ac5a1a69f390fd76fd

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+HK:LJ0TAz6Mte4A+aaZx8EnCGVuH

Score
7/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7c698031738116fc97d34997ee9023c895cd172cf79807758d7609548a85457N.exe
    "C:\Users\Admin\AppData\Local\Temp\f7c698031738116fc97d34997ee9023c895cd172cf79807758d7609548a85457N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:5072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-rMO5MSlohYLZqGOd.exe

    Filesize

    83KB

    MD5

    82bdbf2e2f0ff37340960206ace40441

    SHA1

    5e5f59b1643ca7b3b4f5c175c85569585434eb97

    SHA256

    3cff15032965fd9093de47efe30ec06a3ecbc02874f17dd68413cf869ca726ec

    SHA512

    42810059b78b11fa277f699f734ef63998558b1bc0e8702e9511018856c471c90d926790016f144653c7761cb81ec9a3b0ae935a34b95ca71519b37ec53c3264

  • memory/5072-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/5072-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/5072-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/5072-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/5072-20-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB