Analysis

  • max time kernel
    111s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/10/2024, 19:26

General

  • Target

    6a182baf6f7c2a1fb9b6d52de8791a36fb2c2fe3312d217b275e459dcd1c65ccN.exe

  • Size

    83KB

  • MD5

    f21c6c891cdb3ebc7a463e0cb8f6f170

  • SHA1

    6c148918bcb70590cfaee456953a0076bb758e3a

  • SHA256

    6a182baf6f7c2a1fb9b6d52de8791a36fb2c2fe3312d217b275e459dcd1c65cc

  • SHA512

    e88a186ae0687586e55aecd16b3abd5e4d28afbf101bf7ea0ed036854b361ffb46b382660007031d78f5a8b77e03699645461f55fe2f16edbcc29a869bfce0c9

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+qK:LJ0TAz6Mte4A+aaZx8EnCGVuq

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a182baf6f7c2a1fb9b6d52de8791a36fb2c2fe3312d217b275e459dcd1c65ccN.exe
    "C:\Users\Admin\AppData\Local\Temp\6a182baf6f7c2a1fb9b6d52de8791a36fb2c2fe3312d217b275e459dcd1c65ccN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-kR3Hu3YpJY6VN8QW.exe

    Filesize

    83KB

    MD5

    eb88d177cc0440100cb91304e6ef2052

    SHA1

    cbd84e38a8f0dcb662454073c4aa50d20fffc861

    SHA256

    783d8068be307bd4135aa8b1b982f6be1087b15e2cb3a4255b4dc0a1892a4752

    SHA512

    a1678dfdb8b5e6e6bfcaa63c7edc10ccf15f6e1465ed2b57a080dfd33f2ecba30dc3ef3f1cef44e35cb667b3b4cf8c2145bbecb9798ec83a28c061960e2729e4

  • memory/3876-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3876-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3876-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3876-11-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3876-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3876-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB