Analysis

  • max time kernel
    111s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2024, 21:22

General

  • Target

    7a0445775046237df40e23d74284d12ccc75ef38187c1fcce8a9914c8a1b9eefN.exe

  • Size

    83KB

  • MD5

    15c8f31cdfc30ec1f2cbe797d2426dd0

  • SHA1

    db9f9dc128734cd29a2aef4949b47a66e285c45a

  • SHA256

    7a0445775046237df40e23d74284d12ccc75ef38187c1fcce8a9914c8a1b9eef

  • SHA512

    d4f22392a4b383401bb62310e3fd3b6ee37094071759a6268722c60adf674e1f1b18990312089b9617943f8de749fd099a0d09051c4069720d6e493441324b16

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+XK:LJ0TAz6Mte4A+aaZx8EnCGVuX

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a0445775046237df40e23d74284d12ccc75ef38187c1fcce8a9914c8a1b9eefN.exe
    "C:\Users\Admin\AppData\Local\Temp\7a0445775046237df40e23d74284d12ccc75ef38187c1fcce8a9914c8a1b9eefN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-fjggVkoTWOPsD2X4.exe

    Filesize

    83KB

    MD5

    66aa6ebd3c7a9b4e2a6e1b1e3ae18afd

    SHA1

    2e3b81f67224f0569ec77f44ad6778108e1bd516

    SHA256

    d4c2f81dca9da339bee9a911fed8851c1c5405d5e8e517ea680114ba0f21ce75

    SHA512

    4228072fb687dae5b80514c6e4c5806bbd0b3937e70cef5dda41c9233d853219c52442be2134928c066505a6d20bffeead11755221c34e918038ac82ddf4fb4e

  • memory/1172-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1172-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1172-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1172-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1172-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1172-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB