Analysis

  • max time kernel
    120s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2024 17:48

General

  • Target

    a5edf2b9fec75ef9d9f66af5e5e19ab9b18ea430f8a00dc05bb9a0a9ec9c2b37N.exe

  • Size

    83KB

  • MD5

    45ce6cc0176ad7414664dfbf1641d0a0

  • SHA1

    1c5c6140e97f5d068f3e4eb4926167c76b87b742

  • SHA256

    a5edf2b9fec75ef9d9f66af5e5e19ab9b18ea430f8a00dc05bb9a0a9ec9c2b37

  • SHA512

    64fb62594676808cb797aa93eb2075458c6fa14820a8741f21f692cbf6aa463019ab8ba8298df6d614ada5c68d5af431c85259a84908b6b789c11e629c9fe0f2

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+0K:LJ0TAz6Mte4A+aaZx8EnCGVu0

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5edf2b9fec75ef9d9f66af5e5e19ab9b18ea430f8a00dc05bb9a0a9ec9c2b37N.exe
    "C:\Users\Admin\AppData\Local\Temp\a5edf2b9fec75ef9d9f66af5e5e19ab9b18ea430f8a00dc05bb9a0a9ec9c2b37N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-QGJ2WzHH96sAiZOG.exe

    Filesize

    83KB

    MD5

    8e6b810af477eab6916aa79e071d37fe

    SHA1

    3c8ed09eb604c97d02b80a9571d2aca92a7420ff

    SHA256

    8c60f97287edcae81177d2de690dfbea2e83407eb2fc1e31f6635aaf0d352239

    SHA512

    d1dfdede49ef745bf9ce5033bafe01c4ff7987037e1a18ad402280e46e2626f028867280ccd2f30b7934f7ef2be9eb8451dbb60538eb89e29af2942fd2bed00a

  • memory/4324-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4324-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4324-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4324-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4324-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4324-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB