Analysis

  • max time kernel
    111s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/09/2024, 00:54

General

  • Target

    76c50698c60e0032765a3d75999629574e9f24c96cbb1c051db77cf2f8baec76N.exe

  • Size

    83KB

  • MD5

    ae6fb12da0bab6807d1e88ab8362eff0

  • SHA1

    a642e063a80f0f99cfa6595a658aade32d75a524

  • SHA256

    76c50698c60e0032765a3d75999629574e9f24c96cbb1c051db77cf2f8baec76

  • SHA512

    a2ef4126194ec59bb05bae528344f692ca1bf01a0edb65f8affb2fbbe56861aa6b1ba9e52ae6e5ce04b1cd8713b1e10f827018896dd4ac41941a4696c356fcce

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+/K:LJ0TAz6Mte4A+aaZx8EnCGVu/

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\76c50698c60e0032765a3d75999629574e9f24c96cbb1c051db77cf2f8baec76N.exe
    "C:\Users\Admin\AppData\Local\Temp\76c50698c60e0032765a3d75999629574e9f24c96cbb1c051db77cf2f8baec76N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2204

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-jAPNv1CFgFoD8eqn.exe

    Filesize

    83KB

    MD5

    29b841211561514051584a2f8aa2245d

    SHA1

    e8d5a5403d8d56820dacd3b7ad952af59fb9c024

    SHA256

    bffd5739892979a059ecf7ef1973394810e7d4252aabaf6089da193b83a13ab4

    SHA512

    85f4f1caadbb11c19045dc4af119466656e375ada3b8c4a2199b9bd7db3fbed45aa0fc4206a1a0a9aa9d1bb2f396bd2ffaab2a4457de45408e25af7fdbb59cda

  • memory/2204-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2204-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2204-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2204-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2204-21-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB