Analysis

  • max time kernel
    91s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-09-2024 05:20

General

  • Target

    cc9e91b706e008a4cc795e6b6f4963a482804178d25aeffb53299ca48f342815N.exe

  • Size

    236KB

  • MD5

    ce75db7af438190eef5177174b95a490

  • SHA1

    500b7836b477085c8409118d2dfbc3c353780c31

  • SHA256

    cc9e91b706e008a4cc795e6b6f4963a482804178d25aeffb53299ca48f342815

  • SHA512

    b5a4c891a3e8384f119e884c936a1a1270bf4e0b9a9d5905ef2c10f6491367a08f71fdf6441a3713f52128ca373b15cae14ca94184e9592615bfa3caf9092af1

  • SSDEEP

    3072:AJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/7/FnncroP9:kwDeM7iNEkgiOb31k1ECbJ/F

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc9e91b706e008a4cc795e6b6f4963a482804178d25aeffb53299ca48f342815N.exe
    "C:\Users\Admin\AppData\Local\Temp\cc9e91b706e008a4cc795e6b6f4963a482804178d25aeffb53299ca48f342815N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-4HBhfLgirlqQOrzB.exe

    Filesize

    236KB

    MD5

    ebd3aa1b6c02f773921506e0d10115e0

    SHA1

    2d6e1375c3d93b0e84c60f916cd13d38d17d5dec

    SHA256

    97f438051859c1e51d0fe05d058e5ed996e80da3b19ccfa9eeaf0bec2355b551

    SHA512

    171b5c5487f43015ab05868cbaf26682a68cec4397f7b35291f0f20b00eb68ede4117c245e2630ab5d8b4afb9fbceb7bde05d92b9b9c4f653966ccf56716876a

  • memory/1616-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/1616-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB