Analysis

  • max time kernel
    114s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/09/2024, 08:29

General

  • Target

    185f74ce19a119c2887699f827bf13dc9f6a15e01d299158d798522a8fb3a1c3N.exe

  • Size

    83KB

  • MD5

    6b50fcf95b6afd46aa1e8a632d18ba20

  • SHA1

    7139c0dcdaa56e0abd3182475245adb2164f0016

  • SHA256

    185f74ce19a119c2887699f827bf13dc9f6a15e01d299158d798522a8fb3a1c3

  • SHA512

    8883f459101edce0743067b2859aca56fcd1062a231cdf50cc183e553eaafe830d06b73410d7996d667ec70548241569b56f60fa1514737dd2458a09fdc205e9

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+BK:LJ0TAz6Mte4A+aaZx8EnCGVuB

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\185f74ce19a119c2887699f827bf13dc9f6a15e01d299158d798522a8fb3a1c3N.exe
    "C:\Users\Admin\AppData\Local\Temp\185f74ce19a119c2887699f827bf13dc9f6a15e01d299158d798522a8fb3a1c3N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1104
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4048,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=4468 /prefetch:8
    1⤵
      PID:720

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\rifaien2-2tPzUtFTWhSs0LqH.exe

            Filesize

            83KB

            MD5

            cf36191b8937c631dc33db285bff5439

            SHA1

            0109fb4250810b230f15250ba9af0a4cdd618d2e

            SHA256

            3386595f20f385b27b1143887b302e91b4a4b6f93ef0789dc93340bb6f0cd04e

            SHA512

            f11108472ed1c34aa08f01506fc2d6aea2e04493629b180a10bf12cf3de0f988bf87e39c82ea82de45d800b253c5dc7366b03a7e34a5c1a961697d1c28ea78ff

          • memory/1104-0-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/1104-1-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/1104-4-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/1104-8-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/1104-15-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/1104-22-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB