Analysis

  • max time kernel
    111s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-10-2024 16:06

General

  • Target

    49a69df74e684820d7ce2fa7b0e869a8900b95fa96ee9a4c96cf5bd2bad6e7f3N.exe

  • Size

    83KB

  • MD5

    1e07a96d88d6ab16b3c3486cffd6c590

  • SHA1

    e03d0407f160e694b07b606c0800b7cfd8cc54b9

  • SHA256

    49a69df74e684820d7ce2fa7b0e869a8900b95fa96ee9a4c96cf5bd2bad6e7f3

  • SHA512

    4f8a56fcee6dc7c3dad97a4761bb7614618005ebd2abd4e39b60105392cf528d8cd4b057b4c9a129dac0faee92fd4263d5345dcf05bf56ebf18c0feb1044f8d9

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+cK:LJ0TAz6Mte4A+aaZx8EnCGVuc

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\49a69df74e684820d7ce2fa7b0e869a8900b95fa96ee9a4c96cf5bd2bad6e7f3N.exe
    "C:\Users\Admin\AppData\Local\Temp\49a69df74e684820d7ce2fa7b0e869a8900b95fa96ee9a4c96cf5bd2bad6e7f3N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1108

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-uYsGl0HkfLXU5AeB.exe

    Filesize

    83KB

    MD5

    1218a354d7053a3ee8a28c15de9ab338

    SHA1

    88400ed65947a3f9ba24ede2cab0fe9474d4d756

    SHA256

    41ac7bd869cb8985885a17a7918085b20b13d8c1906665716fc39f9c5eb6779b

    SHA512

    06c19663555654ac8db318a4a36450a1c5055b56c4da266747a03b6ab01302d9232a761ded5849575fed945152a7b55b3077ac9d5a592ad9ed45681e8d315a0f

  • memory/1108-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1108-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1108-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1108-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1108-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB