Analysis

  • max time kernel
    109s
  • max time network
    111s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/10/2024, 20:56

General

  • Target

    afe727f3578189500a0fab3fc1e51e82433131ab18fa5077760fd1169a2e4123N.exe

  • Size

    236KB

  • MD5

    0dcabbb8d46077a808effdf78664ca10

  • SHA1

    f8a25edfcac000eefd41257b616f91b0ef8055d9

  • SHA256

    afe727f3578189500a0fab3fc1e51e82433131ab18fa5077760fd1169a2e4123

  • SHA512

    586b33c9cc1abac636a6a0e540e99cb49d27d3e6b332dec3eb1bec9dad39ff1bc926737cbbcadd0bc1a8b1fac834b1c18d0e7eab02da8916fdd5c6f1efb8bf04

  • SSDEEP

    3072:FJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/p/FnncroP9:PwDeM7iNEkgiOb31k1EC1J/F

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\afe727f3578189500a0fab3fc1e51e82433131ab18fa5077760fd1169a2e4123N.exe
    "C:\Users\Admin\AppData\Local\Temp\afe727f3578189500a0fab3fc1e51e82433131ab18fa5077760fd1169a2e4123N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-MWGeAaxkfljWcawQ.exe

    Filesize

    236KB

    MD5

    191f94d764e1a8c3147112f71dd6cbe1

    SHA1

    373fbc345005c511d3b7dd6a5edd7d6495c94c32

    SHA256

    02a874399262d9d316ece0e727ad09f0affa3aa11863fced33d1e54c77e32c29

    SHA512

    8d4806afb5564d4e19fe7295a71942e7f76ef926f5bdb2321a85547942472c5b7e627a28799e20706651a106759b487b9439e59f80ec479863c3dcdb4136a308

  • memory/4452-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/4452-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB