Analysis

  • max time kernel
    93s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-10-2024 02:48

General

  • Target

    119117e87a11c0434f624f74d5b81979cac9ce72b907006bc9f2c3caf8853269N.exe

  • Size

    236KB

  • MD5

    a5b8dd7a5658151cf7c5fdf268d42080

  • SHA1

    e229daeb093e4cab91648357b6c756422a48106e

  • SHA256

    119117e87a11c0434f624f74d5b81979cac9ce72b907006bc9f2c3caf8853269

  • SHA512

    ea4b3bb8804fbee7931981446d9df4688eda9661e4ee9c31a43e6064ab38e3272106741a8425d2156d46e866439a1137753944318b6a2a4b8e44aba6f82b5c01

  • SSDEEP

    3072:uJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/J/FnncroP9:ywDeM7iNEkgiOb31k1EC1J/F

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\119117e87a11c0434f624f74d5b81979cac9ce72b907006bc9f2c3caf8853269N.exe
    "C:\Users\Admin\AppData\Local\Temp\119117e87a11c0434f624f74d5b81979cac9ce72b907006bc9f2c3caf8853269N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-CG4UOla0kP5vgx0G.exe

    Filesize

    236KB

    MD5

    c9f118251d500cbf1c561cc48cdbc0a8

    SHA1

    c9490d25c02b8b11b8ca0fe983f2701f02f87987

    SHA256

    ed90c14448daf1bb5097cb50c06624fc154b4a91057d3e39e24da9ecb7c6143a

    SHA512

    6327ef3c8f3d0e88edc8553bd9d5ce67e9ea6b3621493085317abb06841674f1a347338c4eb14ad61da616ea18de59fd87a341a39996a1266ea31add44b95216

  • memory/4440-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/4440-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB