Analysis

  • max time kernel
    111s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-10-2024 00:03

General

  • Target

    62f4ede4ff71abf5c3a69024debc15c5c851415f7f45edd35ad3e8b701d7a941N.exe

  • Size

    83KB

  • MD5

    3530de8ce8b12bf7e0da341df0fe4e40

  • SHA1

    d7ff62549b76de0165d3c03c5f91946f455f4abb

  • SHA256

    62f4ede4ff71abf5c3a69024debc15c5c851415f7f45edd35ad3e8b701d7a941

  • SHA512

    a8119b66e36e68740d6f14435802a9a74ed0228a6a7433152d1c4f58a65117ba8272e74af3d540a6fa4b45cf492bdec6d5c73cbca01697b7657aadf2922da75d

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+aK:LJ0TAz6Mte4A+aaZx8EnCGVua

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\62f4ede4ff71abf5c3a69024debc15c5c851415f7f45edd35ad3e8b701d7a941N.exe
    "C:\Users\Admin\AppData\Local\Temp\62f4ede4ff71abf5c3a69024debc15c5c851415f7f45edd35ad3e8b701d7a941N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-MZlcch4KvRGXBKx1.exe

    Filesize

    83KB

    MD5

    ebe5a407152ce893c67c8f545905b7c2

    SHA1

    56c909dd11021ed5a026555960ca27ec5558aec0

    SHA256

    ac3690504534fec73a7a8507fd1821b0e407fcc7a888544c3abcf7bc7810406e

    SHA512

    4c3fedbc2294207ba97e0937577b1f1a6324093e226a50943477e05e71521e20d0bd0099c9dbe4f85ccdf6b72d29b625f13d5fbdd128e06608baf611cdc83712

  • memory/4528-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4528-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4528-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4528-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4528-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB