Analysis

  • max time kernel
    102s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2024, 14:55

General

  • Target

    20fba89c14bb7b39881b32a4f5def8b854683d1405a942c187600b06486d54a6N.exe

  • Size

    236KB

  • MD5

    bf37d84929c2195e1fb855e639662b30

  • SHA1

    9c5eefc709998a03eb19682b76a97d1e863c0827

  • SHA256

    20fba89c14bb7b39881b32a4f5def8b854683d1405a942c187600b06486d54a6

  • SHA512

    7ea8e4ec191ecff3d782bed53e1cf5be8352c51323873752902d0e766cf225c5d4724e8a9fb50ba4a0484b8d9b849b2a70984beeef04d528fbe3d5badea04cf7

  • SSDEEP

    3072:bJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/g/FnncroP9:dwDeM7iNEkgiOb31k1EC+J/F

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\20fba89c14bb7b39881b32a4f5def8b854683d1405a942c187600b06486d54a6N.exe
    "C:\Users\Admin\AppData\Local\Temp\20fba89c14bb7b39881b32a4f5def8b854683d1405a942c187600b06486d54a6N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-8VhdD3iAy0t30pSL.exe

    Filesize

    236KB

    MD5

    0654bc013624fddbbbc6d48ae96f0655

    SHA1

    50f0effd415ed01e94e5b22d076f8cfad4c3e5f5

    SHA256

    330125bbb4ffccd3a370f996d139a93dfa2c8fb3355bb317fbec94e9c8b31e34

    SHA512

    d3db39bea404830e27a67cbe0b781a47e31481ff46bcf969d082355648012f39eb8533d4deff1192cea7968c438d53e20e68b3e30620b4bc37bc848de0a94d81

  • memory/4524-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/4524-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB