Analysis

  • max time kernel
    111s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/10/2024, 11:23

General

  • Target

    5f6e97e71d6288189a00f73f3947b6367a59c7ec2054060863018f40dbc76936N.exe

  • Size

    83KB

  • MD5

    87eff000526148ee9e4dee47f0008ac0

  • SHA1

    66fe55dd035d8ffc8ee19715a7d70b9ece9e14a3

  • SHA256

    5f6e97e71d6288189a00f73f3947b6367a59c7ec2054060863018f40dbc76936

  • SHA512

    87b91f5ecd6fb71e5f8de75f95f81fede17fe2405cc7af573097a19ca946f759c0866e7d8a4a15714472c53f09a4925fdf127f29c9c18df31e5132a79db67d23

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+FK:LJ0TAz6Mte4A+aaZx8EnCGVuF

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f6e97e71d6288189a00f73f3947b6367a59c7ec2054060863018f40dbc76936N.exe
    "C:\Users\Admin\AppData\Local\Temp\5f6e97e71d6288189a00f73f3947b6367a59c7ec2054060863018f40dbc76936N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-6vmumvoP3OqRP5Ls.exe

    Filesize

    83KB

    MD5

    80d5c91c101f0f367cd7ff1afbe85da9

    SHA1

    b8e8dedd74801eef277dee725ccdccbe9838b564

    SHA256

    3e027db6efefa4da2cc2ab146d94886d830a91ff505af90719b56dc192b03610

    SHA512

    d5865e5dab639d5890cdaf1e27c85e1ffa580ff539ac1b40e417cb02c27a99934a64e60db70cbd73adcb025a21bf3a08d20ea490c7e6d1567cb90e8293e7b0c2

  • memory/1436-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1436-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1436-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1436-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1436-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1436-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB