Analysis

  • max time kernel
    111s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-09-2024 23:28

General

  • Target

    dd29fcd4c2a8979ae6cb33358e613bc5dc2229c323915b214ff7adf7fae57767N.exe

  • Size

    83KB

  • MD5

    834eff145243acb02c6eaf33f8833450

  • SHA1

    d9a5cc7765867420771743b0abfa2767ba0777a8

  • SHA256

    dd29fcd4c2a8979ae6cb33358e613bc5dc2229c323915b214ff7adf7fae57767

  • SHA512

    e01f72d0d5880196e4d7d928f71dd6a27215765714731ed1067a82a57ee63a050e845962197c06fed2526ee23cb9ded216f12bb44d51b65c00c7f3800045295a

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+cK:LJ0TAz6Mte4A+aaZx8EnCGVuc

Score
7/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd29fcd4c2a8979ae6cb33358e613bc5dc2229c323915b214ff7adf7fae57767N.exe
    "C:\Users\Admin\AppData\Local\Temp\dd29fcd4c2a8979ae6cb33358e613bc5dc2229c323915b214ff7adf7fae57767N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-jF4yIq9un13EsKf9.exe

    Filesize

    83KB

    MD5

    d7009d9a8c5280e52cc26b9227c028a5

    SHA1

    022af546ce52a5a45ee179ee2a9a041a81bb9f3e

    SHA256

    dcb331f8aa7006647030d1b70e596feb4573bd5192a531dd14b830146a1bcc47

    SHA512

    9f07fbf85d9a55f2454a8f383ffa7e42166a168c33697a3a7a2ddcd316ec8dfad0cd3035ab89538e10d325ae776075a2f433950b9aa97feea86f7793544ee1c2

  • memory/4248-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4248-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4248-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4248-9-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4248-16-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4248-23-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB