Analysis

  • max time kernel
    111s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 06:52

General

  • Target

    393f2ea136d48a8bda21ea90ff206f18958058ccb6ebbc80f92c0ee230105f41N.exe

  • Size

    83KB

  • MD5

    62d1f379fb77a800578484347a722430

  • SHA1

    172467b43bad73132d16af65de91161f6bf94b52

  • SHA256

    393f2ea136d48a8bda21ea90ff206f18958058ccb6ebbc80f92c0ee230105f41

  • SHA512

    69b1708cf0c11fe9fc71b76c5796113faa114f24634d1ae4ca929d48eb316cdafab2f179959447f4a886eab484e7241118fedb2b04996476d7bc4234571a6106

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+PK:LJ0TAz6Mte4A+aaZx8EnCGVuP

Score
7/10

Malware Config

Signatures

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\393f2ea136d48a8bda21ea90ff206f18958058ccb6ebbc80f92c0ee230105f41N.exe
    "C:\Users\Admin\AppData\Local\Temp\393f2ea136d48a8bda21ea90ff206f18958058ccb6ebbc80f92c0ee230105f41N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-G0Yp0m2Kzmnqhmuu.exe

    Filesize

    83KB

    MD5

    433eb7e42920a78b0c2d2dc7572b68cc

    SHA1

    e1eb3ec3f588fa0d1a9341acd678576ac0bb9842

    SHA256

    f2ffc99572d9956cd5456ff9f23996611f4bbe9ce4e0dbf431309fe624800b81

    SHA512

    b36fe9e149b0e9cde07795256ae91ad4d20615b36eca71917820741d4ffeb93c8f8a3065e926178036ce6da49156536ede2b22329d1ac0bf8c5462457330d1d2

  • memory/1884-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1884-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1884-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1884-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1884-11-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1884-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1884-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB