Analysis

  • max time kernel
    111s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-10-2024 14:11

General

  • Target

    0272e6aaa7fbfe5e584338a4baaa6e052558dea4397a5e31037923daa1f876f2N.exe

  • Size

    83KB

  • MD5

    9530188ea4f3f18466f406fe7fcfa180

  • SHA1

    e31a968682d0f6af7bd7762df243ca83ed79f8b0

  • SHA256

    0272e6aaa7fbfe5e584338a4baaa6e052558dea4397a5e31037923daa1f876f2

  • SHA512

    89fea46df677916da8c8723d870b1f6c3f445268b76d869f6b4da7a6ff126a9feab1fdc0029a4193be3cd6c9958434c2e16f7d805aa2f61d4fe5fc507d321c6f

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+mK:LJ0TAz6Mte4A+aaZx8EnCGVum

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0272e6aaa7fbfe5e584338a4baaa6e052558dea4397a5e31037923daa1f876f2N.exe
    "C:\Users\Admin\AppData\Local\Temp\0272e6aaa7fbfe5e584338a4baaa6e052558dea4397a5e31037923daa1f876f2N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-LoCAwKt0ymb1t7D0.exe

    Filesize

    83KB

    MD5

    c1fa309a588ee20ad7bca76c182a83fa

    SHA1

    07bc573c912d45ba3db9e02b052efe6ecaf39442

    SHA256

    2d92d2642245bf1a1ae49ca4b2c4e1d61b59e12f2ee5fe595243f225604e15bf

    SHA512

    90692e347e983acc23c7127528e94b0c9d32d6298f3d8a2791a2efa3ea6f3b837c99943f91492c730d597ed83803f6bf91f4e96fe6b08d369304504157dc9c6c

  • memory/3852-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3852-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3852-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3852-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3852-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3852-19-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB