Analysis

  • max time kernel
    110s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-09-2024 21:12

General

  • Target

    8f0de54fb17f6f4d9ca7ab577724c308b4c1568db7230b87789d85fa32fe7c08N.exe

  • Size

    83KB

  • MD5

    dca331d0f47918b5253bbe1cecf339f0

  • SHA1

    5c8cf2cb5b71ae1ca75533fb76d65cde2ed7bfcb

  • SHA256

    8f0de54fb17f6f4d9ca7ab577724c308b4c1568db7230b87789d85fa32fe7c08

  • SHA512

    e24a52a6354a5bcdca1cbffde06c78f9194371c62db5fbd82fe8cc03a28c1201a24ed12252573ba183da9e640c6f81ded20d8a838af72399791798e97487d8a4

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+SK:LJ0TAz6Mte4A+aaZx8EnCGVuS

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f0de54fb17f6f4d9ca7ab577724c308b4c1568db7230b87789d85fa32fe7c08N.exe
    "C:\Users\Admin\AppData\Local\Temp\8f0de54fb17f6f4d9ca7ab577724c308b4c1568db7230b87789d85fa32fe7c08N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-Xbqi0kT9dEcdGqsu.exe

    Filesize

    83KB

    MD5

    0289104fd3d56fe6a8c71bab642a8775

    SHA1

    309622938019d18ec7799ceff57574a47646116f

    SHA256

    f9bc6b048ac04d865272e7ce18ca5f50cfc37c3c0beac2b6e4e38d24ffec34ad

    SHA512

    aac5d952876f2a5cd173d539ec91def241d41d762e5d9f7a6a8f8b2f749be9b766fa74ce1141be2781af664027376e28de352b8f7963597a0a8dfa48d6480112

  • memory/3464-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3464-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3464-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3464-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3464-21-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB