Analysis

  • max time kernel
    120s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/09/2024, 18:25

General

  • Target

    a4959c9473dcabf1b3a87feeb7554714a748e897e22bb81f6f9dfe40fe9f3219N.exe

  • Size

    83KB

  • MD5

    b3e55125a3aab82e50017fbf172bafd0

  • SHA1

    e1c0a011d1a697a9e1038d92f78a66fa19e0d604

  • SHA256

    a4959c9473dcabf1b3a87feeb7554714a748e897e22bb81f6f9dfe40fe9f3219

  • SHA512

    450cf82576a9b43c2ad9e60c96f31bd202edcd387f792352dd575040c13661a6a24db848a18952f7aeb1bd674b9ba7628b7370e88a41fe875030e69d9937796a

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+VK:LJ0TAz6Mte4A+aaZx8EnCGVuV

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4959c9473dcabf1b3a87feeb7554714a748e897e22bb81f6f9dfe40fe9f3219N.exe
    "C:\Users\Admin\AppData\Local\Temp\a4959c9473dcabf1b3a87feeb7554714a748e897e22bb81f6f9dfe40fe9f3219N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2516

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-i9o44ZW8OiE1kYAb.exe

          Filesize

          83KB

          MD5

          123bc783a4f445ad8d31dd6583913559

          SHA1

          b36efbecf3a05ba69aba9c3022a3bf20b917b80c

          SHA256

          51688a4dc9dbe5ecfb72bd193cae720e0eb6ca42a5d8e81dd7d57f9759648e39

          SHA512

          c675a0e57c39bc682ef7a378794b2afc9b6ed44b31dadc4f5b817232e69e7e1e2c5ad05892855e62dc05907895eacd74d632f6bd3a05eba5af89a1ffa4c095c6

        • memory/2516-0-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2516-1-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2516-4-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2516-8-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2516-14-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2516-23-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB