Analysis

  • max time kernel
    111s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 12:32

General

  • Target

    3920015aa1b16a1e01f88f244c27fa495e6bfb68c7dd32261f543e18517ffc1fN.exe

  • Size

    83KB

  • MD5

    8108a47000f1847b00c153231d4ec280

  • SHA1

    3278a28771b7550baaeb91df584f26c01114e479

  • SHA256

    3920015aa1b16a1e01f88f244c27fa495e6bfb68c7dd32261f543e18517ffc1f

  • SHA512

    2fe62e2ebe5c57efae25fc893efa37983955e1e696ff87a00c07511febbaa9b48918fbe2b87f82ac039b237dd5567565128efb3153bb4e1d7061b16ed88db2c2

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+AK:LJ0TAz6Mte4A+aaZx8EnCGVuA

Score
7/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3920015aa1b16a1e01f88f244c27fa495e6bfb68c7dd32261f543e18517ffc1fN.exe
    "C:\Users\Admin\AppData\Local\Temp\3920015aa1b16a1e01f88f244c27fa495e6bfb68c7dd32261f543e18517ffc1fN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-aSXEe3Ix7eDX9qsa.exe

    Filesize

    83KB

    MD5

    3c224eec5c66e752baa0106dc2474df0

    SHA1

    b73a8d3bcca5d7b0ffc8a69f6c93d22b1f8ebea3

    SHA256

    ce6864ffc96af1b6c8d717f54a3c716cfd47c93e8c98a56dbdf906391f9ead5d

    SHA512

    71f157cc8bacf2c484f4803888f0e0cfa54aa501d959a5e982e979f025763ea1eb290404d3a1d72a4c3a4aa2bc62c8e6a4a1d5b285e5a89c2aaaaa99517739ff

  • memory/2612-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2612-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2612-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2612-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2612-21-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB