Analysis

  • max time kernel
    93s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-09-2024 07:42

General

  • Target

    b2f3ba1bc8df1dab7092f3c54382b7bb37db28fdfc1ca14d685df5c41c16991fN.exe

  • Size

    236KB

  • MD5

    21a1abe7f4e1f13bf98e23a843d7d430

  • SHA1

    94ec80c8ec62ea030d4bc8dc416d287a4b14b1d3

  • SHA256

    b2f3ba1bc8df1dab7092f3c54382b7bb37db28fdfc1ca14d685df5c41c16991f

  • SHA512

    f2b2577be09b84c9a24d3493f23bb0a00407cdb440a464015fdba8b1f02e2aa4c80e1ce733851f00ca342184c68a74779ed2cb9a69e327a3fbc0c672545cece1

  • SSDEEP

    3072:9J0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/k/FnncroP9:nwDeM7iNEkgiOb31k1ECiJ/F

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2f3ba1bc8df1dab7092f3c54382b7bb37db28fdfc1ca14d685df5c41c16991fN.exe
    "C:\Users\Admin\AppData\Local\Temp\b2f3ba1bc8df1dab7092f3c54382b7bb37db28fdfc1ca14d685df5c41c16991fN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-Yt47IYmxagukPN9y.exe

    Filesize

    236KB

    MD5

    0e4c72834fcae108950d5d18ba57f2f2

    SHA1

    2bdf30e8473cd82ee8d6f45efbf219ab9ea6fb34

    SHA256

    6b79194b81a2fcfc2f91f8a05ef4069f7657cb6a145e39d22032a5a0ea7f2850

    SHA512

    ca1e00514f2a26fdfff22d770bb54223a4fb137bc3a5ece90bed3568ad746a28eee8379b8d9a3f10ddd8ac01c1e4edb80ad1b82ffb0ae6098a61c348dc22d515

  • memory/4564-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/4564-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB