Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/10/2024, 06:33

General

  • Target

    a84be6c6e9637b6ca1211471380cd7871c308424ed7937f37761ef565aa74f86N.exe

  • Size

    236KB

  • MD5

    b25e789e17f4003b3dfc1f94624b5080

  • SHA1

    974ce36502b560aeaa85af065a63125264bfaa5a

  • SHA256

    a84be6c6e9637b6ca1211471380cd7871c308424ed7937f37761ef565aa74f86

  • SHA512

    3b426f605bf4f2ae8ba5276885dd40c502f61ca1ba1eaf6cbb8bcd1ea9b775ada97e0b548981d2a53f54156f5026dc951746292ecf4f89165ce2dd319f2bb81e

  • SSDEEP

    3072:sJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/X/FnncroP9:wwDeM7iNEkgiOb31k1ECnJ/F

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a84be6c6e9637b6ca1211471380cd7871c308424ed7937f37761ef565aa74f86N.exe
    "C:\Users\Admin\AppData\Local\Temp\a84be6c6e9637b6ca1211471380cd7871c308424ed7937f37761ef565aa74f86N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-NyWux6lUooM40bCd.exe

    Filesize

    236KB

    MD5

    6f05230f57ca644d75c7395079d2f1bb

    SHA1

    2a5ff99422f65d61ffe0627880b489de69e9c313

    SHA256

    e13637eadaf62575ab6b8a9510ca8c52ccb8ebdd1da996e9febfdaf7e3cae06d

    SHA512

    f97813a79d1ca0a78576bbb76d896970de4ad4333a2064cfcf4cf91a62d6d8bb7c0254c109e1d258049c5ab3cea7b00fa9d7f47edd896cdd00c9720854351902

  • memory/2344-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/2344-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB