Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/09/2024, 17:06

General

  • Target

    c524fdadf81585048bbc6e7ece337f48dbdf6741a48a0940f7fb94a66af2527aN.exe

  • Size

    236KB

  • MD5

    709340e1ebc020cc5fa743b4e497ad10

  • SHA1

    c5724319c424c7a64350750d3e2eea187465589f

  • SHA256

    c524fdadf81585048bbc6e7ece337f48dbdf6741a48a0940f7fb94a66af2527a

  • SHA512

    97f4ea5922f5423d410711177395f100c3bac8ddab5c46ffb292c2b3bd385fce65e0772ae6e0e6107ab9fb5146d501837c89e9a8d0da4319c913417f557bf9dd

  • SSDEEP

    3072:VJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/f/FnncroP9:fwDeM7iNEkgiOb31k1ECPJ/F

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c524fdadf81585048bbc6e7ece337f48dbdf6741a48a0940f7fb94a66af2527aN.exe
    "C:\Users\Admin\AppData\Local\Temp\c524fdadf81585048bbc6e7ece337f48dbdf6741a48a0940f7fb94a66af2527aN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-3i2pYbc5FzlFP1SH.exe

    Filesize

    236KB

    MD5

    7b2fc528c40d39876ea7767eb718e054

    SHA1

    171fbf9ae5e59c2c1414031635dc0be351bf0482

    SHA256

    0251decf4d44d6d720564951a964a3bb621fc820ad0a7d38a800e29befcd25fd

    SHA512

    6cf41baf339f5059b7e15973ce74dabe68098b39a9a9d8424bd5a5c3c97a233326365b3fbaf2baa7c0e4185459cdb6c3a7f9ec894d80d7c37197e865152f4a46

  • memory/4004-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/4004-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB