Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/09/2024, 16:52

General

  • Target

    a02bcdb0b907431a6e09e8af275af40e15a5c073654a2cd1839ebcffd066a7b5N.exe

  • Size

    236KB

  • MD5

    18be29989828f828b81f958781b271b0

  • SHA1

    a693e0b6ab9f80db6b68bea14f214cc437592338

  • SHA256

    a02bcdb0b907431a6e09e8af275af40e15a5c073654a2cd1839ebcffd066a7b5

  • SHA512

    0542c91cd3c2b6d3c5edc4c0c91bab9ba0a6a3d2046f8848b58a60877388a095568922412fc4e9f8b46a8417bbf4bf29d193c014942391cd7a9e1665371ae053

  • SSDEEP

    3072:4J0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/Y/FnncroP9:8wDeM7iNEkgiOb31k1ECGJ/F

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a02bcdb0b907431a6e09e8af275af40e15a5c073654a2cd1839ebcffd066a7b5N.exe
    "C:\Users\Admin\AppData\Local\Temp\a02bcdb0b907431a6e09e8af275af40e15a5c073654a2cd1839ebcffd066a7b5N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3684

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-AnaPN6EAcsfVy3Cu.exe

          Filesize

          236KB

          MD5

          3ed628e37c877c56279f0098bf486bf8

          SHA1

          0d5ec578a1b84c84eb1ff6d57fade75c47178a1c

          SHA256

          608de185ef3050e2e284ced0de7327440dbc375ecd101b256f6b781cd1037e2a

          SHA512

          bd553d185ef5a9abada53e561479bb950a31616576284fc89acec4c8a0a8d91f4b6cac3f49d7014b8ca2d51dc206a7546b70f03d3110a53088b3840e350f2364

        • memory/3684-0-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB

        • memory/3684-1-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB