Analysis

  • max time kernel
    120s
  • max time network
    117s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-09-2024 01:39

General

  • Target

    e08afadc76721ce40cdb99612d0cba1185136c6c2b83c2b756e03e1ff3826b8eN.exe

  • Size

    83KB

  • MD5

    400e2fd4af804845ffc32290a77c5030

  • SHA1

    691a8895a133a7707a32322d8942c5e478d19131

  • SHA256

    e08afadc76721ce40cdb99612d0cba1185136c6c2b83c2b756e03e1ff3826b8e

  • SHA512

    2d6459a799f9ad0364d1b66811e1b6de5414729bc36eaf2a71ba6e30014d51d8734e37a8f6b6e4a13af79840edb724f986200db9a15b91264e0bef82fc0fdd83

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+ZK:LJ0TAz6Mte4A+aaZx8EnCGVuZ

Score
7/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e08afadc76721ce40cdb99612d0cba1185136c6c2b83c2b756e03e1ff3826b8eN.exe
    "C:\Users\Admin\AppData\Local\Temp\e08afadc76721ce40cdb99612d0cba1185136c6c2b83c2b756e03e1ff3826b8eN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4108

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-hvZkR0hBJKr0qnaw.exe

    Filesize

    83KB

    MD5

    09c9f10ff6e31c1bd031ee971ea79d37

    SHA1

    bf2849b6d10d915bccd49123d19067d800fc9f4e

    SHA256

    331217ba9e1da19df7aa2d0b48a2a3f5bc07ec9f10d09c9b95215bb5e7777baa

    SHA512

    6bfd45ea08a38a29a08eba592988ee9b23e3bccc505f2dd9341a52a045f0255aa6e7d29a0becdbe02110e785f8c057e9fcb8747c1351cedfb8a5400d8ba4a15d

  • memory/4108-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4108-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4108-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4108-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4108-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4108-20-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB