Analysis

  • max time kernel
    110s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 06:55

General

  • Target

    08217ddcf88dddaa9845e9e9cd20508000dcdb58b30ad5afb99192d89c235b64N.exe

  • Size

    83KB

  • MD5

    94b2dea18b7c2a97461531f9bc332100

  • SHA1

    eb7fe817d8743744fa375c487772523667e81632

  • SHA256

    08217ddcf88dddaa9845e9e9cd20508000dcdb58b30ad5afb99192d89c235b64

  • SHA512

    aeb078a82b2709a3190e01b1ea996130c93df83bfec3e1cf6308d18ec5093ae85d9ffc5ed5b2fe192c3c2458ab5ef42168d896ce5ffe3266fbc40cfc8f12a50e

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+WK:LJ0TAz6Mte4A+aaZx8EnCGVuW

Score
7/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\08217ddcf88dddaa9845e9e9cd20508000dcdb58b30ad5afb99192d89c235b64N.exe
    "C:\Users\Admin\AppData\Local\Temp\08217ddcf88dddaa9845e9e9cd20508000dcdb58b30ad5afb99192d89c235b64N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:5004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-7jsIevKrG8J9T0LZ.exe

    Filesize

    83KB

    MD5

    528c1cad7d8370813ce7c901196542f7

    SHA1

    7f7422faaa8e3e77451424b07f6dbffa5083a8d3

    SHA256

    87fb5637171f88c5e62cb4215b14fcb409847c359a5c0eb9d161d57377dec184

    SHA512

    a3ce6adba4bc4def4b4176d6a3c001d9f69787fd89a8111af702863f3d22ab27f29416c79372e27446b637f24ad54071946a440cead8cf00b98792dcf6961a66

  • memory/5004-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/5004-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/5004-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/5004-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/5004-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/5004-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB