Analysis

  • max time kernel
    111s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-10-2024 22:00

General

  • Target

    c61f8fd66748af18537c7198ad26087157a30789749e0f9a48dbbe017640e0ceN.exe

  • Size

    83KB

  • MD5

    1a347cbca9574df689ed68cbd8decc40

  • SHA1

    c8ed51e4238f56a19e501a3db55c03c7459f6972

  • SHA256

    c61f8fd66748af18537c7198ad26087157a30789749e0f9a48dbbe017640e0ce

  • SHA512

    893d06b44f0d9a0d31406a52cf3f29fa5f37a8a1e93016ac7b7585ab3da994988dbde9091ecbb3db24cbd4f538a623b517e4a3bc939bdcfef818f4f796d79d74

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+hK:LJ0TAz6Mte4A+aaZx8EnCGVuh

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c61f8fd66748af18537c7198ad26087157a30789749e0f9a48dbbe017640e0ceN.exe
    "C:\Users\Admin\AppData\Local\Temp\c61f8fd66748af18537c7198ad26087157a30789749e0f9a48dbbe017640e0ceN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-Vuiq8tCOGbdLQ217.exe

    Filesize

    83KB

    MD5

    5665df53b7c730799aea2e87b69cafb2

    SHA1

    48ffadea25d19bf6aaac5f1f429a8c9d787087fe

    SHA256

    26e95c7c6a131beeb2f1007b7d6b4b64f120e76a603ec006e1b560284332d9d8

    SHA512

    4471989c715f2d3eeaa09d0bbefc795445a07b79003a3de66c85a100804ebbe9f2a54bd58a3f18bd65a7968ea73e49e0e54f00572d7554b98155f7686a0651e0

  • memory/3360-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3360-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3360-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3360-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3360-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3360-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB