Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/10/2024, 09:56

General

  • Target

    cc15dafbe767d1997a6614d8c8f829ce8949e8264989bc0033a1dd2ad44722aaN.exe

  • Size

    236KB

  • MD5

    5c6227e75a4bc204fc84a60afb9d7b10

  • SHA1

    8fe0ad01d73f14b5efb99963d30838192366a77f

  • SHA256

    cc15dafbe767d1997a6614d8c8f829ce8949e8264989bc0033a1dd2ad44722aa

  • SHA512

    a6cda8b6ddc9b02969bc608bb51d485a9e1b6cdb45683ed32fc4da552e791c6bbffe8ddabff511384708776afdc67223b864b0d0472aeb3cf085182dc16eb151

  • SSDEEP

    3072:VJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/y/FnncroP9:fwDeM7iNEkgiOb31k1ECUJ/F

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc15dafbe767d1997a6614d8c8f829ce8949e8264989bc0033a1dd2ad44722aaN.exe
    "C:\Users\Admin\AppData\Local\Temp\cc15dafbe767d1997a6614d8c8f829ce8949e8264989bc0033a1dd2ad44722aaN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-co74ZsVdnKYYnr1a.exe

    Filesize

    236KB

    MD5

    c11d71b0a7b719874deb7e9f29b30527

    SHA1

    9b9b81cd06d8090e01305c5f5c9ab7aac0621fd9

    SHA256

    64e9831ec3fac76ca885603bcc583477bf40bdb7c5f7107f926a2e0a34451d9b

    SHA512

    a4a90e320d4427eca5ec953b82e2c85127fffedc9aed6cd4039a31585b032734eebcfb288b7912b0bf9f3e392efa9d257a1deb59ec6a42b3b2c7006723bc3685

  • memory/3552-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3552-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB