Analysis

  • max time kernel
    111s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 07:05

General

  • Target

    ddd2d7fc05bebfd5ce37692d2ecfba695a9942e6874857a531898f1ec1769b45N.exe

  • Size

    83KB

  • MD5

    92d3b218cdac5e912450662199879440

  • SHA1

    a207d8aced89ff406834b613421a5e440adf36e7

  • SHA256

    ddd2d7fc05bebfd5ce37692d2ecfba695a9942e6874857a531898f1ec1769b45

  • SHA512

    31fa90c03a5db2bfa30024eca9c0b881750ae99c928baa151a23f255254da476a5717d89e2ca6fbeacecd370fa61b27c096e4b02296c5ca348c9225c2192285b

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+HK:LJ0TAz6Mte4A+aaZx8EnCGVuH

Score
7/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ddd2d7fc05bebfd5ce37692d2ecfba695a9942e6874857a531898f1ec1769b45N.exe
    "C:\Users\Admin\AppData\Local\Temp\ddd2d7fc05bebfd5ce37692d2ecfba695a9942e6874857a531898f1ec1769b45N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-cdS1YNhx96DW89jK.exe

    Filesize

    83KB

    MD5

    cd7342919a6ed2728a6d58f3aa44e4b6

    SHA1

    4eaf9a4ef6c347fa20f24081462f54a6f5a34ffb

    SHA256

    c7afe16b5b3de7180c4c0b2b051ad20449696e64a6abc14b63a7343fc9bb03e8

    SHA512

    e4064299ed5abfbdb0e3def26e995a022e7653ed157abbd78f689b631383fb32d4bbc6b16b12cea28d0825a325f3e98ace7ce2c5a2c891a35f59a9a73f513d77

  • memory/4876-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4876-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4876-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4876-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4876-16-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4876-23-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB