Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2024 11:13

General

  • Target

    ee83a2e1e38e93d5bb593806b694cf2e9a003b229900139664e266ed6b39429cN.exe

  • Size

    94KB

  • MD5

    8f2204b4552eb5ec76b245d694acdcc0

  • SHA1

    b12dc2065fc81e3dc8b7b7a0e4c7f9dee68783b1

  • SHA256

    ee83a2e1e38e93d5bb593806b694cf2e9a003b229900139664e266ed6b39429c

  • SHA512

    290b8a9f7dc6ec5d2eebcef1ca05e6b592a7a5f69698133e8330e89cbf801aec51f0c4f15029cd1c565331065d63bf3df2e80f2f1ef7a6a0b9f0b4a5cc845105

  • SSDEEP

    768:xGvbqsQdX5BhGEnOsIzfJ4i4g5p0syi+hvN18K3H8T6++3KI4Fyu8hc/:szqsQ5PIt4+/yfeB6r6Yc/

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee83a2e1e38e93d5bb593806b694cf2e9a003b229900139664e266ed6b39429cN.exe
    "C:\Users\Admin\AppData\Local\Temp\ee83a2e1e38e93d5bb593806b694cf2e9a003b229900139664e266ed6b39429cN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\My Downloads\LordOfTheRingsr Full Downloader.exe

    Filesize

    94KB

    MD5

    653d001e1ea74c88dc052764ba282fb2

    SHA1

    8cc2774ba2922f028e8d531c0e7ae8e256b408da

    SHA256

    035d8de1fa4a33f13c2507d7ee420b4df2ec081d2b7ed1a64f867e812c134e17

    SHA512

    9fb7fb8ee25f59fca3468bf7ba4b0bd5058a230a63dab9c7ef7534284bef09ba81e9c0d5cca3073d38ca9482968fa7899c1cd14af4bb0da2162143e1ba17cda7

  • memory/1152-0-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1152-101-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB