Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/10/2024, 04:56

General

  • Target

    c26f54b6281a9f4448d625f7d96bd30befee2476641780334ecfa3c76d048b59N.exe

  • Size

    236KB

  • MD5

    b883a0311fd9f29415e27b9a3707c4b0

  • SHA1

    e12c0e6ae51d85f8cbb0ede20e7e92fb36df56c5

  • SHA256

    c26f54b6281a9f4448d625f7d96bd30befee2476641780334ecfa3c76d048b59

  • SHA512

    04766ef1853874ed0194c01a7de119acdc95967797c15df329fae116f520ce73d2c626a7b606f8e66a632f85cbacc3884ffa0c5fa86b52314903ea8059eeb995

  • SSDEEP

    3072:fJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/4/FnncroP9:BwDeM7iNEkgiOb31k1ECWJ/F

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c26f54b6281a9f4448d625f7d96bd30befee2476641780334ecfa3c76d048b59N.exe
    "C:\Users\Admin\AppData\Local\Temp\c26f54b6281a9f4448d625f7d96bd30befee2476641780334ecfa3c76d048b59N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-u6jLgj9JYGCDcYrb.exe

    Filesize

    236KB

    MD5

    338da5eae52157d192b8704d7c1b82f7

    SHA1

    e6d1c53c46ea885cf2bf4b8cebb1e586f48b25f1

    SHA256

    e84429b4cba501f0cdea0d7871b297b1e2f7621a12473af82e1da17eb8ae02b5

    SHA512

    3dff285b018b4ec6a80664a4c7c3c60d0aa76d398e06329156f037f2921537f221b4d4471e0f09c667784be7880a54c13a66003a49dfd9039b600028425af92e

  • memory/2460-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/2460-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB