Analysis

  • max time kernel
    92s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-09-2024 08:02

General

  • Target

    cabba83f791096a50062cbcf95c2423ad2b391951f67f4690e4da5f7af1d1ee3N.exe

  • Size

    236KB

  • MD5

    d3d9cad15d7b07e25523d1b5f31cb1f0

  • SHA1

    eb588f49e2907ef398a4d7ec8d1c1c5b98cbba8a

  • SHA256

    cabba83f791096a50062cbcf95c2423ad2b391951f67f4690e4da5f7af1d1ee3

  • SHA512

    642645124cb9b20a37860fe8c78d14f757514cd768feb4042f4a4493568026a41b163f29985cffc08cd743e7b4584e1fd156582db683777fb793a26a36ef1a26

  • SSDEEP

    3072:rJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/J/FnncroP9:twDeM7iNEkgiOb31k1ECVJ/F

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cabba83f791096a50062cbcf95c2423ad2b391951f67f4690e4da5f7af1d1ee3N.exe
    "C:\Users\Admin\AppData\Local\Temp\cabba83f791096a50062cbcf95c2423ad2b391951f67f4690e4da5f7af1d1ee3N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-MbbuZ5EZyyAlxkyy.exe

    Filesize

    236KB

    MD5

    11ace776d7eb99ff30585bafe242d95d

    SHA1

    409d588cefc03a3b9acaacb5959fcb24543d2222

    SHA256

    0938932dd00e468ef8fd51076c177f6b032e64305534a43761206c0aff477c78

    SHA512

    7d72865ab21edd0118fb94b96ec6a9ac6b0088b53c584ffc96ba4c314c0ad79b27b1f6cac830f4d32d3972b2466452ea9988ce8de88f0122eb58e131b8305019

  • memory/2536-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/2536-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB