Analysis

  • max time kernel
    111s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 06:52

General

  • Target

    33256e7d6bb4779c66c8480e0e5d7eea15200a6b8ff330da1d2511290750f298N.exe

  • Size

    83KB

  • MD5

    2da30220af5eac6f9ddfe502b0fe7660

  • SHA1

    df192b41909e998b6195f582491ecb9d7dfc67ff

  • SHA256

    33256e7d6bb4779c66c8480e0e5d7eea15200a6b8ff330da1d2511290750f298

  • SHA512

    091ddb98e1ad8627d533ec7a6d620b7803cf8712ba8c9ae6d8eaa803a6edb7b06067797561aa1a11797020b3b7be510488297d606b10d13a1ecb7a17d96d0df7

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+WK:LJ0TAz6Mte4A+aaZx8EnCGVuW

Score
7/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\33256e7d6bb4779c66c8480e0e5d7eea15200a6b8ff330da1d2511290750f298N.exe
    "C:\Users\Admin\AppData\Local\Temp\33256e7d6bb4779c66c8480e0e5d7eea15200a6b8ff330da1d2511290750f298N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2132

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-GJURM2dkncoXhHIO.exe

    Filesize

    83KB

    MD5

    07a8fe31d129d79ae6e77d8c30dce443

    SHA1

    d8d75787c496cf249a04f4fd2367c059269c286e

    SHA256

    f4e621e3961e30cd1b6aa638f35673be835ee9a7d2228c57eff32660784b46f3

    SHA512

    e742684d61ec3ec150ee14274645f188c09080e7758d6da2c772b3f7024a2f9ef1413b5ad160e999e7feef72541ffe08f20c3db95f9e3b2120d72a1e613b931a

  • memory/2132-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2132-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2132-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2132-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2132-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2132-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB