Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/10/2024, 11:21

General

  • Target

    36a99d49371dd7e30546871e350c986cf497da8a73bfb2d7cc0f2199a1883d85N.exe

  • Size

    236KB

  • MD5

    c3969fe8c99bf2ce034d85400afefe90

  • SHA1

    5150a3ce3d81df6205c711ae655807286d14cd9f

  • SHA256

    36a99d49371dd7e30546871e350c986cf497da8a73bfb2d7cc0f2199a1883d85

  • SHA512

    d55c60bfc99c4a01e17994eebf5f585c1d525130469d6eb02dd78f61d25c4568b225467b4bc36ad32d5a812c083674ce97b57e75b473261933f9acc9aad6bb12

  • SSDEEP

    3072:iJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/+/FnncroP9:WwDeM7iNEkgiOb31k1ECgJ/F

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\36a99d49371dd7e30546871e350c986cf497da8a73bfb2d7cc0f2199a1883d85N.exe
    "C:\Users\Admin\AppData\Local\Temp\36a99d49371dd7e30546871e350c986cf497da8a73bfb2d7cc0f2199a1883d85N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-9TNvsv7PyTSxVRXC.exe

    Filesize

    236KB

    MD5

    05e463dd89e944f3284e94eda304cdf9

    SHA1

    3030faa90f3d98b87c9ef5f0fb4464ac49704098

    SHA256

    216c3a6fc39246fcba9f492ee8956bf83986ff8b727d5ded4bc9efeb3413e12b

    SHA512

    5563d56836d0c17b1dfda20e050e465b1f9ff96216c05a53c85ab96e3d75f8e66c8ad80c9a20ef20cf0296ad1915dfe467e6c6711744768994b20b57d11bd12b

  • memory/3692-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3692-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB