Analysis

  • max time kernel
    111s
  • max time network
    92s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/09/2024, 13:31

General

  • Target

    37e5b8f45b93fdf6d2d68287a61fe02cb10237a6c13b30d667ebdacd42c5c8caN.exe

  • Size

    83KB

  • MD5

    457709cad086a8ea2f10e9e2a0b036e0

  • SHA1

    f9d1c0a87fe6044ecaad6d3833d8fc11f3eb8984

  • SHA256

    37e5b8f45b93fdf6d2d68287a61fe02cb10237a6c13b30d667ebdacd42c5c8ca

  • SHA512

    e5cec1d77922b04af3be51e466a531d6e27ad7735c2f25326a29ea50b3c4103f2a2c6dd50ae285413a35ae6ca01303a4f750f55e5a0fff36cb5a6c519a25da57

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+KK:LJ0TAz6Mte4A+aaZx8EnCGVuK

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\37e5b8f45b93fdf6d2d68287a61fe02cb10237a6c13b30d667ebdacd42c5c8caN.exe
    "C:\Users\Admin\AppData\Local\Temp\37e5b8f45b93fdf6d2d68287a61fe02cb10237a6c13b30d667ebdacd42c5c8caN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2740

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-ZOpAdu0LO4w8ZC05.exe

          Filesize

          83KB

          MD5

          d0963ffb0f1ce06845efdddc924f882a

          SHA1

          fac8817c4e16becd9e902348063d179426baa658

          SHA256

          8672cdbe8a53d5bc1c11b86eee593eee6d3db8994743f62eb665a58e5a6519e0

          SHA512

          bf4e760960cf61ad3d157c72d7754fb158e074f9991851db78fa9a1e617c41a6f0547c26e90155f81c898f645551c09ea0fc4775972c4bcdb10805ebac9ab2fe

        • memory/2740-0-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2740-1-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2740-4-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2740-8-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2740-15-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2740-22-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB