Analysis

  • max time kernel
    98s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/09/2024, 09:35

General

  • Target

    c05a01827d5db28032d76329345d791acca2dfbdbf61eedf441618e94a938e81N.exe

  • Size

    236KB

  • MD5

    4902c9096a09487d61040473685c2cf0

  • SHA1

    53e25d3565e8a9ebb1c431a7b53fe9f58e9424e8

  • SHA256

    c05a01827d5db28032d76329345d791acca2dfbdbf61eedf441618e94a938e81

  • SHA512

    acb19da8c400ef52c5eecf766f1e846a7197c6e3999df6084f4b6cbadb5ad992ba3e404942cd8712f52a588c4324500ec2452c647f930e14553fe524d92eb2a4

  • SSDEEP

    3072:/J0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/j/FnncroP9:hwDeM7iNEkgiOb31k1ECjJ/F

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c05a01827d5db28032d76329345d791acca2dfbdbf61eedf441618e94a938e81N.exe
    "C:\Users\Admin\AppData\Local\Temp\c05a01827d5db28032d76329345d791acca2dfbdbf61eedf441618e94a938e81N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-mF3BCgSjLbVzPep3.exe

    Filesize

    236KB

    MD5

    8439b80f7c814ae6de18aa2ca13a04ac

    SHA1

    337a28d22074239da569f4f7eb393b558ee24597

    SHA256

    01c8d0d0f69e378db10b6ce465b9c6c494f28d901010be050caf32e29f0af1c9

    SHA512

    aa9ef9d1427895b5366bff7a8f61ba180a6c7648772bcbd680a688e9664685776c68432f9d3e0193bb29f5d362f63c58071dfa187bf97108c74c394d62814baa

  • memory/1364-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/1364-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB