Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2024, 21:02

General

  • Target

    93b64c40d410605d869d8dbd79fafab1ee22ee5bc538c927b395993eeab0b0a7N.exe

  • Size

    236KB

  • MD5

    b45c6c9f4d433c43a6616560d65f2e80

  • SHA1

    c27189279ce717842d0fae21cc7812b73702a5f0

  • SHA256

    93b64c40d410605d869d8dbd79fafab1ee22ee5bc538c927b395993eeab0b0a7

  • SHA512

    dfb497d9b0fe0e33987045507750b9b0166157c2c1b574806cb38f90811d30f904e30ae3cc018afbd1a19d7c5ddf4a192e8f2f4db53174b47a6b427f627eb031

  • SSDEEP

    3072:qJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/Y/FnncroP9:+wDeM7iNEkgiOb31k1ECGJ/F

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\93b64c40d410605d869d8dbd79fafab1ee22ee5bc538c927b395993eeab0b0a7N.exe
    "C:\Users\Admin\AppData\Local\Temp\93b64c40d410605d869d8dbd79fafab1ee22ee5bc538c927b395993eeab0b0a7N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2988

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-MHxag17wdeDPwshR.exe

          Filesize

          236KB

          MD5

          93422aef00cd272fe1e3a38a79ce1c52

          SHA1

          1b9dc42c5c731906464c7f95549dd623b2713e3f

          SHA256

          2c82d63090c77ff09a33f7f0bc90560d480cd60b9f22557ad4e8ff075991211e

          SHA512

          f05bb0421e73a4f26ad998083b75f94b37828ad8be5adc1fe69d3097f305af8863ed36ef55a2138999796371f707ec02258a94397835e6c33c5a48bbdb3c190d

        • memory/2988-0-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB

        • memory/2988-1-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB