Analysis

  • max time kernel
    110s
  • max time network
    116s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/10/2024, 19:54

General

  • Target

    89d27f0da2aec523c3d65ea3f61c5391f4ecadc019e61304a74a2a93abaafee4N.exe

  • Size

    83KB

  • MD5

    b3a360ebd1316656d701e73f5b0a84d0

  • SHA1

    177d8b2545cc3e8f6839d56ee5763bfb5bc74c6b

  • SHA256

    89d27f0da2aec523c3d65ea3f61c5391f4ecadc019e61304a74a2a93abaafee4

  • SHA512

    a0bccc09b27780334d63a305493e1ce58cbae2ee4117054dd2aac91d5fb0502ef251d69497753345dc385149d17a216892a8eac3b239b53041104acd9cc799e7

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+TkK:LJ0TAz6Mte4A+aaZx8EnCGVuo

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\89d27f0da2aec523c3d65ea3f61c5391f4ecadc019e61304a74a2a93abaafee4N.exe
    "C:\Users\Admin\AppData\Local\Temp\89d27f0da2aec523c3d65ea3f61c5391f4ecadc019e61304a74a2a93abaafee4N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-kgIVadcslzOm9Tzz.exe

    Filesize

    83KB

    MD5

    35d5f1a1f0d5c4a28ec961b92b0fc416

    SHA1

    65873c174ab8c4b45e57d3b0b4e1f6e84c0ed596

    SHA256

    498c5999b8ffbf350da8dd1cf638fbaf33899ee6dfefec0e5d86c751bf78f1d9

    SHA512

    e240c6b97167b150bf17bff945ac293350d2cfad4f1711a2aa7c33311cf8a4141327b1595df93ee725cc50a21ca1cea3c71f2efa7748a8001a5c886d5aeb029b

  • memory/2880-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2880-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2880-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2880-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2880-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2880-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB