Analysis

  • max time kernel
    111s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/10/2024, 23:06

General

  • Target

    0b944e93f3e55e062679f23a89a11981816f8f7bcf3cf048cd737b0eb5843fb3N.exe

  • Size

    83KB

  • MD5

    261b0ecca5c4e6e1350e26dea2ea5140

  • SHA1

    85811b058232a39da4fd3ce73eb8b7edfd46b97c

  • SHA256

    0b944e93f3e55e062679f23a89a11981816f8f7bcf3cf048cd737b0eb5843fb3

  • SHA512

    f04b4094cadd69a2ffaea2c64550802cffcb3341b351d0fa53281ea83796cba1d3261fc50a10f02eb619ef1021164a466b5bc3e80f038c78ba2a1084ab2f129b

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+KK:LJ0TAz6Mte4A+aaZx8EnCGVuK

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b944e93f3e55e062679f23a89a11981816f8f7bcf3cf048cd737b0eb5843fb3N.exe
    "C:\Users\Admin\AppData\Local\Temp\0b944e93f3e55e062679f23a89a11981816f8f7bcf3cf048cd737b0eb5843fb3N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3416

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-nxgH9ut0Srre23OV.exe

    Filesize

    83KB

    MD5

    0bb312e439d48637912798a44a5cc388

    SHA1

    e5d352e80ec1dcde770b6a8f7c56ea038da3096f

    SHA256

    12aea413fe8a6cdc56ee64d20df71366dccf671de5c81aa5a26712da36e4c7a8

    SHA512

    e01d07ba05fa4d1b728d5885b11dfa4823bff17b568908fb69d95bf047145e892ce402d037f6e8b1475edb5a05c6ef8274786d7e1a5ba324d046904981f09087

  • memory/3416-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3416-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3416-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3416-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3416-21-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB