Analysis

  • max time kernel
    110s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-10-2024 15:51

General

  • Target

    795232e7bc8a12887c7c6d78b7e1feac5760cc9da06dc0bebd01578f75999eb0N.exe

  • Size

    83KB

  • MD5

    75f4c1f8fad71e0b57ae822b98d46db0

  • SHA1

    d50fec74c60527015b7ed4b8750f8da3453a7d84

  • SHA256

    795232e7bc8a12887c7c6d78b7e1feac5760cc9da06dc0bebd01578f75999eb0

  • SHA512

    a1bc432c91c0879a9a111e616f1a283c84cd5de103af511df8195b7c06b3ee97d1e6aa886cc6f4a1436e21bb82628e70c0ab1a7e0e9d68449b6e77f9d4943d00

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+gK:LJ0TAz6Mte4A+aaZx8EnCGVug

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\795232e7bc8a12887c7c6d78b7e1feac5760cc9da06dc0bebd01578f75999eb0N.exe
    "C:\Users\Admin\AppData\Local\Temp\795232e7bc8a12887c7c6d78b7e1feac5760cc9da06dc0bebd01578f75999eb0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-li5D6Wf4TAoxn6AA.exe

    Filesize

    83KB

    MD5

    112ea0de5da903d83e450025e8e3b226

    SHA1

    c10b91a984d4c8f3b1f600ddfa3b2efa31988656

    SHA256

    18168b7483a9e44f0a413a1dd3db13b8753a594d561eb8cb656dc04dc4fdb034

    SHA512

    054b6e5539aaefebe715b7cc2ab72b42e9e2a0a0f791dbef7a139d382b5f2dd5346264ca80eae56d0cc46a3027ead062016b7f46642909f83779f43bf7b7ca30

  • memory/696-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/696-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/696-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/696-9-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/696-16-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/696-23-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB