Analysis

  • max time kernel
    111s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/10/2024, 16:04

General

  • Target

    f580affd2e2025f25e78876814b94351454b3a5ec2ed4c72f71d41ab43eecd0dN.exe

  • Size

    83KB

  • MD5

    c952deffc67c2d0d6edf6ee1afea7d50

  • SHA1

    624ae0d64cadcb641f47d6c7d89baeb469f96e9f

  • SHA256

    f580affd2e2025f25e78876814b94351454b3a5ec2ed4c72f71d41ab43eecd0d

  • SHA512

    42b76cc3ea296ba3d575de53f60dde860ba323c093aca59685221f119e161caa749c2309962d122a40d6213506f6726826b13bcfbcfdd487996db8407dd96410

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+IK:LJ0TAz6Mte4A+aaZx8EnCGVuI

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f580affd2e2025f25e78876814b94351454b3a5ec2ed4c72f71d41ab43eecd0dN.exe
    "C:\Users\Admin\AppData\Local\Temp\f580affd2e2025f25e78876814b94351454b3a5ec2ed4c72f71d41ab43eecd0dN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3312

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-co4N3YhGhXM3WjT5.exe

          Filesize

          83KB

          MD5

          c6266b73bdda1a4dc979ea947808dbac

          SHA1

          47df106edf0d6813f1e5a1097d100b99285e7420

          SHA256

          1b2e6cd8a8f53306614653bcc95937c9931886363065e571e5d4bb42e5f9b16a

          SHA512

          f51e5f541cd2eff3f8f15f61c3d0dc4836a1bf5ba99be48e8c00401efd02bd01456c7509c664521252365e96509ffa60065666db4e27aed644015dcd937356c8

        • memory/3312-0-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/3312-1-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/3312-4-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/3312-8-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/3312-12-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB