Analysis

  • max time kernel
    120s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/09/2024, 21:02

General

  • Target

    860387a67bd77fe5d59cac9adf0ff5cd2b0fa5cab894110e3acae99d6fe3f9e2N.exe

  • Size

    83KB

  • MD5

    250ee041c38cf6265b10f4520375b280

  • SHA1

    f78b3536cd6b9e82ae59dd11543b5d718e2347c4

  • SHA256

    860387a67bd77fe5d59cac9adf0ff5cd2b0fa5cab894110e3acae99d6fe3f9e2

  • SHA512

    f7cfb879988b248269c86bbee613a35795ec470177af784da9321bb9e2a2c3e8e2c0deb6aa3a324ce5018e921111ee630819a58420fb158a72ef1a8c48b583ce

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+tK:LJ0TAz6Mte4A+aaZx8EnCGVut

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\860387a67bd77fe5d59cac9adf0ff5cd2b0fa5cab894110e3acae99d6fe3f9e2N.exe
    "C:\Users\Admin\AppData\Local\Temp\860387a67bd77fe5d59cac9adf0ff5cd2b0fa5cab894110e3acae99d6fe3f9e2N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-OPAhRrayJKuQ8cnY.exe

    Filesize

    83KB

    MD5

    e87b7bb3ad9751ecbae06a05255f26ab

    SHA1

    23e161fef0e2f7d0fb0f8001a40660a7b9cf97df

    SHA256

    1f0d856a7d5eefd0f1df7a064dd47311318f84a13484e75e907526b7c405bdee

    SHA512

    1e224dd98bb6081c122c28638fe88bd5eeb6c3f0be985f2947f12b76d61cb668a4a9727099d4162f238e089ad9530e3cffc5b3c0075df50eab6eed793cab8ffb

  • memory/2920-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2920-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2920-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2920-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2920-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB