Analysis

  • max time kernel
    111s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2024, 10:03

General

  • Target

    d3fa1947b70fca5b8233451639721bbf11b6f97ee6ffcdbe66d43cb65e9da93aN.exe

  • Size

    83KB

  • MD5

    2c80b7b5487d104ccb36eae09e343810

  • SHA1

    71d43729d2455804c1b25e0974dccf3bacb6396d

  • SHA256

    d3fa1947b70fca5b8233451639721bbf11b6f97ee6ffcdbe66d43cb65e9da93a

  • SHA512

    1c097d2183931177aa7d7e5827c372f38b2f41b934589320f6de9f1d25bb60487fd9cbf1eabab307c0648f9eec3834d2384d17bb90a1024b7b41067e91fd344a

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+bK:LJ0TAz6Mte4A+aaZx8EnCGVub

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d3fa1947b70fca5b8233451639721bbf11b6f97ee6ffcdbe66d43cb65e9da93aN.exe
    "C:\Users\Admin\AppData\Local\Temp\d3fa1947b70fca5b8233451639721bbf11b6f97ee6ffcdbe66d43cb65e9da93aN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-uizUsut57hafhrsF.exe

    Filesize

    83KB

    MD5

    88401aa0a36624c3009f1fb15047fc3d

    SHA1

    af6d33d411d77fe7a8cc2a8061afb147fd4d50aa

    SHA256

    eefe541d653a26acfe05e8a49382b3b681691b2066f0fc362f061261214f528c

    SHA512

    f5d44e522919fa2bce3303f95b427ce93d6d85cf7de08d1659d24891e21bebdbf13bd7cd31bab326dd85e04809aabf6ec48abc01d60712932b3b306d832c47a5

  • memory/1236-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1236-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1236-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1236-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1236-20-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB