Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/10/2024, 04:27

General

  • Target

    1d3c9760da24e2d0de4db0e4f919f010e84316130615085f0e140ac87033870dN.exe

  • Size

    236KB

  • MD5

    31d8ae4630c67bdc44dd67473e5d6da0

  • SHA1

    5a8cb4e3900beb1a57d844ed231ce8a91c33bf28

  • SHA256

    1d3c9760da24e2d0de4db0e4f919f010e84316130615085f0e140ac87033870d

  • SHA512

    8826d5f6b278d9e075b4119bc2eb02e8c01068e4153813dbaa192ca173c442a8475b8a0ecf31ed0b56aa4e72bce07faf119a1e491dda91c3fb61d2fc4b8e92e3

  • SSDEEP

    3072:QJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/f/FnncroP9:0wDeM7iNEkgiOb31k1EC/J/F

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d3c9760da24e2d0de4db0e4f919f010e84316130615085f0e140ac87033870dN.exe
    "C:\Users\Admin\AppData\Local\Temp\1d3c9760da24e2d0de4db0e4f919f010e84316130615085f0e140ac87033870dN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2920

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-3yAHNGzjVki3bN6a.exe

          Filesize

          236KB

          MD5

          4fc1674e6b07aa0dc6851d5a38acc5e7

          SHA1

          32df4bf1f3d102628a90616fe74e0aced5cd3455

          SHA256

          9f06a0108bfab8dd03ae29894b06a06bb047321cf79356f3a98c28fd4d405273

          SHA512

          c51591e14c5eafa9732049d9824f514db5820246f7d8661b356a63db68fdf1cda5eb6c58f756b15656427aebb529ea8e19bd261ad5c2ffb30ed9b2a55f9420f4

        • memory/2920-0-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB

        • memory/2920-1-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB