Analysis

  • max time kernel
    94s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/10/2024, 04:21

General

  • Target

    17e7081243a9a565ad539667f1d5076dcbeb81bbd0d0e630cb521a3e1c810354N.exe

  • Size

    236KB

  • MD5

    afd1547d8ba414f179425c6682c08d00

  • SHA1

    a1a9816cf44af700bb05e94878526b1a87abbc8e

  • SHA256

    17e7081243a9a565ad539667f1d5076dcbeb81bbd0d0e630cb521a3e1c810354

  • SHA512

    979a05081dd7e9234bca25322e3db56ebb6efae19718b4015beeacc0fdfae1af0fc1fb1b00f2774e39a897fdbbea5874894dca9b035b0118f7e8986457c38672

  • SSDEEP

    3072:4J0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/u/FnncroP9:8wDeM7iNEkgiOb31k1ECAJ/F

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\17e7081243a9a565ad539667f1d5076dcbeb81bbd0d0e630cb521a3e1c810354N.exe
    "C:\Users\Admin\AppData\Local\Temp\17e7081243a9a565ad539667f1d5076dcbeb81bbd0d0e630cb521a3e1c810354N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-5QCJxCada6wQgnzX.exe

    Filesize

    236KB

    MD5

    0d29a3a6462b4ba336319dd755d26838

    SHA1

    b7a591bd1d57114ad0560b73522aeda4c1d4690a

    SHA256

    4d14fcff93e71ab24e573845cde74bca2856c970191bc6be25bbf4c320571b65

    SHA512

    ecabc02017c4e4045367464aa59f7627cb2f567fbc175072c42a882fcdbb61ba0f197f53ca287b89852aa39ae411fc362b4278ab5706df38e6dfa21bf9a9f763

  • memory/4404-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/4404-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB