Analysis

  • max time kernel
    140s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/09/2024, 04:29

General

  • Target

    f539262c31c84cdc7a2a9f7178c5871d77504e3e40a48e610e64f6a1f56864b6.exe

  • Size

    83KB

  • MD5

    8adb14357280494874a54bade7c67f80

  • SHA1

    052615745b106ebfb934f8cb13462be5e1449720

  • SHA256

    f539262c31c84cdc7a2a9f7178c5871d77504e3e40a48e610e64f6a1f56864b6

  • SHA512

    ed571b4ba1f8ae5fbaf7d9d7d579782e74b75556466866594c571cf3027c2683c49938e88a767a90510ff047d35e5cc86f49ff4d52dfb919aa032fdf8c679bb3

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+OK:LJ0TAz6Mte4A+aaZx8EnCGVuO

Score
5/10

Malware Config

Signatures

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f539262c31c84cdc7a2a9f7178c5871d77504e3e40a48e610e64f6a1f56864b6.exe
    "C:\Users\Admin\AppData\Local\Temp\f539262c31c84cdc7a2a9f7178c5871d77504e3e40a48e610e64f6a1f56864b6.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-8FV27nz7arnOuVlX.exe

    Filesize

    83KB

    MD5

    9da91c9b30ea332e2a7e34948769bb25

    SHA1

    70bbbc2cc0829d93563d106fc3549654575a8384

    SHA256

    bdd5730299da4d9295f96cc529073c390918acb8b7039c523cf552868985ec22

    SHA512

    95070ad4a9871a380a228a8a0243bd7bae7b55fa09e11ca8d62c743f01d22c7cc44f79c47ca51d11873435c5a6175646baffcb29f9163f30156bfe5d4e2abee1

  • memory/3960-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3960-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3960-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3960-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3960-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3960-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3960-29-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB