Analysis

  • max time kernel
    111s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2024 01:34

General

  • Target

    101e88d434309049326cc62c525398726dffde4f64ca54f1529b7f5edabdf41aN.exe

  • Size

    83KB

  • MD5

    1555c6193a5addda430c77e8709e5e80

  • SHA1

    3aaf1221d8d561973c6f64f13ad8d246466054b5

  • SHA256

    101e88d434309049326cc62c525398726dffde4f64ca54f1529b7f5edabdf41a

  • SHA512

    80f08e89c64cd2343c1820b42fbdf10bd8110815c129a77069014f1d72c37862706c33b88e6bcf884b21baca62d3dfa49b81d7296fec790672807e5cca45838a

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+2K:LJ0TAz6Mte4A+aaZx8EnCGVu2

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\101e88d434309049326cc62c525398726dffde4f64ca54f1529b7f5edabdf41aN.exe
    "C:\Users\Admin\AppData\Local\Temp\101e88d434309049326cc62c525398726dffde4f64ca54f1529b7f5edabdf41aN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-P265m0Pcw0994xoY.exe

    Filesize

    83KB

    MD5

    563660d4c959417ebda8d87f67f849b2

    SHA1

    9baee53c1cdd584b25bb929c19123607b9934ff5

    SHA256

    2b9c5fe6e8f722fa41bf66fa529c8d181093d647a2abcca6e41959a26e482265

    SHA512

    95f9613a9e5a5c0bacfc227475f9dc4433ccca2c0cccae70cf88282a7dc261e46060bff57daf637d46b756c5fdc75850e8793af4f85fe71c17f65539e192ae9e

  • memory/4988-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4988-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4988-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4988-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4988-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4988-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB