Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2024 04:31

General

  • Target

    bd06bd5052dc9901e9beaf15947edf96540afb65e4f9e9ecf6bf84d9ae65d906N.exe

  • Size

    236KB

  • MD5

    75ba53dab194ca551df13b4066589300

  • SHA1

    4a93fd6e46ae446102eb751c6a058e9dd11b670e

  • SHA256

    bd06bd5052dc9901e9beaf15947edf96540afb65e4f9e9ecf6bf84d9ae65d906

  • SHA512

    9ca3f0cbd048a0f6c6500fb931dff8b92a2173857e8822def7979883639f6a1710757f06a9d583167b86bcb859529d20ea282a65e76e86f4ecc3f2c09e12377a

  • SSDEEP

    3072:YJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/L/FnncroP9:cwDeM7iNEkgiOb31k1EC7J/F

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd06bd5052dc9901e9beaf15947edf96540afb65e4f9e9ecf6bf84d9ae65d906N.exe
    "C:\Users\Admin\AppData\Local\Temp\bd06bd5052dc9901e9beaf15947edf96540afb65e4f9e9ecf6bf84d9ae65d906N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-Oej8zCmkIqWlqyvP.exe

    Filesize

    236KB

    MD5

    c146e34cdbacda219d6fb6dcb2f06883

    SHA1

    f4bfe2c8f494229f5c4fe2e095676436c3b56511

    SHA256

    2df619552263269dbea79a07c9c4ea0e6470a6856cf80af2a1de06896d75b0ac

    SHA512

    9057da5faf4aca1af561d098e2d8f6e68243061325556b1d36b0433bc3a3f4b2c304abc0020a0fed82a8270a341b4af006c117b3bdd57e15bc5461fd059151d7

  • memory/1004-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/1004-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB