Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2024 13:58

General

  • Target

    ac8zt2/di.exe

  • Size

    19KB

  • MD5

    c9bd3a63d975900ab7337fda84b2bbc7

  • SHA1

    87caa7f12cb273f5e8e18dbee6965fdf95b989bf

  • SHA256

    6d5a2ab5f2de24f2a5f48d899838156970f1919d00332634bb70cda5f8777065

  • SHA512

    11d46db08678ccebb54f03c4bb15766874e1a5573c88b1982c28cb40e9381b90798c08a08a498624d0a3ab8bc57a6e02982f8ff6e5f2a3f2d325fc477abf21c0

  • SSDEEP

    384:+NosNEnhA0BZdYRKF6yech2ysFJj3M5b4Z8vvjORboTD6:4OhArAIyecMyk9eMZ8vv6R8TD

Score
5/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac8zt2\di.exe
    "C:\Users\Admin\AppData\Local\Temp\ac8zt2\di.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3480-0-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/3480-2-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB