Analysis

  • max time kernel
    110s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/10/2024, 15:40

General

  • Target

    852b4f2edaa799c6b3eae42c09a012b644de53dba952229af561ce50a5f4e9cbN.exe

  • Size

    83KB

  • MD5

    8b02cc12d42406cd4fe27c5d870c7ff0

  • SHA1

    5ef170f5b52f6f8b437cc69ea47052ee02bfbf82

  • SHA256

    852b4f2edaa799c6b3eae42c09a012b644de53dba952229af561ce50a5f4e9cb

  • SHA512

    e89f60586da8ef248af430fdcd7ad42889b9c444f2765339fb12cfe1101e12e2fe75eda70d8b426f4f14b0293027d420a4d4b0ffb2696de8b1cb972ad5014c55

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+oK:LJ0TAz6Mte4A+aaZx8EnCGVuo

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\852b4f2edaa799c6b3eae42c09a012b644de53dba952229af561ce50a5f4e9cbN.exe
    "C:\Users\Admin\AppData\Local\Temp\852b4f2edaa799c6b3eae42c09a012b644de53dba952229af561ce50a5f4e9cbN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-8vQN3k7tepb19gbH.exe

    Filesize

    83KB

    MD5

    0fc796ca3be9365ae88a2e6c10ed4a4f

    SHA1

    fcfe471e515f8ec2f0d554719109600db192c132

    SHA256

    6edcb1bc4308721a22a413edc48edd686bbee713f9c02bbb4b4d4640182ad013

    SHA512

    7cca6ec7ce9e04e15c38430f02441e972797050f4b186b8690af70d4dc56419f4521b37999baee29fc2a4949075681486cdb6e1f3d2d981f0db1466741f31eec

  • memory/3612-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3612-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3612-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3612-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3612-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3612-19-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB