Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-10-2024 07:33

General

  • Target

    041e3cd9efaac5736b528054f3e15689924c852da20c2bfbdcf5ff462499c5f0N.exe

  • Size

    83KB

  • MD5

    cb98d65d43742bd4dc5c369cf0c12c10

  • SHA1

    55ec560bcf32c30725847baa6e0ac59af2f3399c

  • SHA256

    041e3cd9efaac5736b528054f3e15689924c852da20c2bfbdcf5ff462499c5f0

  • SHA512

    b614d7f5c1cc6e8810ff29715ce81ef0bf80d2a16556a2f55b67dcb9193c8484dc1ba1a6b6fed9168e1a1a83b6ffdd573a3f8a59fae70efe0f04431ac8258254

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+dK:LJ0TAz6Mte4A+aaZx8EnCGVud

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\041e3cd9efaac5736b528054f3e15689924c852da20c2bfbdcf5ff462499c5f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\041e3cd9efaac5736b528054f3e15689924c852da20c2bfbdcf5ff462499c5f0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-qMhnIngWOMkNNQxh.exe

    Filesize

    83KB

    MD5

    44e1f31eac095bedaa5274eee6ef1b26

    SHA1

    5b46bcdba95a8bc7aeb9a1060bb585e0420a7722

    SHA256

    fba09068a3f606809f508c3e23368b6e972c460ccf2d10c0b7c5c4af028800ca

    SHA512

    2b7f385e441a7617864bfda2f100065f39ddb44b3d3cfcdf0a9955caac7a73b24fa01d6af59621379f28734c78a0a15e92cf0f7178db9955dd5654c5bdd6c067

  • memory/2356-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2356-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2356-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2356-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2356-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2356-21-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB