Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-10-2024 22:51

General

  • Target

    0b9c389be3564c536ad250e8d0e6bc7b85ff96b577e029e505851d9e8eb5475cN.exe

  • Size

    236KB

  • MD5

    b01c975035d37bb01262976d63391e60

  • SHA1

    45969eafa51f868343345e105c906a1264a905ea

  • SHA256

    0b9c389be3564c536ad250e8d0e6bc7b85ff96b577e029e505851d9e8eb5475c

  • SHA512

    665e245fff3bb4715254d144b019071140c72d1d5959eab58f04b79b962da727e24e2cdd8e42c8459730da9e069860bfc77b1f1a00e7edd4603fbaef4d96826d

  • SSDEEP

    3072:mJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/q/FnncroP9:KwDeM7iNEkgiOb31k1ECMJ/F

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b9c389be3564c536ad250e8d0e6bc7b85ff96b577e029e505851d9e8eb5475cN.exe
    "C:\Users\Admin\AppData\Local\Temp\0b9c389be3564c536ad250e8d0e6bc7b85ff96b577e029e505851d9e8eb5475cN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-dE9PaWyEgy5Jh0xQ.exe

    Filesize

    236KB

    MD5

    f3955d01fc4fb68748ab3b29bbfcdf55

    SHA1

    298c672df2afc60ddd637cf22ffc7e455b8240fe

    SHA256

    0b03353eb2037328527b19d50d104150e51cc9cf62cd271f53f5fe31c62061ea

    SHA512

    5280aa50d991ebdd67339ea6e54749d1efa635780d6cb28955e1bf8c656c55c635a461436fa5a4f0fa05523dc199884f1073a1f9f175d222ac9eb0d120f981d2

  • memory/3548-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3548-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB