Analysis

  • max time kernel
    115s
  • max time network
    116s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/10/2024, 01:31

General

  • Target

    31339c61bcf6cf9d3898e0c0881affa32a1c04cfbab31f9633bc2871b1dc6e21N.exe

  • Size

    83KB

  • MD5

    6031709b776c84a1bfbcc51b0b0ad6b0

  • SHA1

    8045f34288ffb4aed4ed4a3e04f54a1cce1423a3

  • SHA256

    31339c61bcf6cf9d3898e0c0881affa32a1c04cfbab31f9633bc2871b1dc6e21

  • SHA512

    655e182f99f3a01f1c184647b6c8f14da8545b026bcf1c12b7d269f81bdbe6a0607e6f83c5fb6467ddbd127dc9fba843666458e1b8a17d1519dcc179d6cedb6f

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+6K:LJ0TAz6Mte4A+aaZx8EnCGVu6

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\31339c61bcf6cf9d3898e0c0881affa32a1c04cfbab31f9633bc2871b1dc6e21N.exe
    "C:\Users\Admin\AppData\Local\Temp\31339c61bcf6cf9d3898e0c0881affa32a1c04cfbab31f9633bc2871b1dc6e21N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-OZTydxZbXVfbjMWd.exe

    Filesize

    83KB

    MD5

    af5cfa6f90b42ca83b0c5dcdfdee0f9e

    SHA1

    7d04130e7541eda7cab60210feabd07b118dcd1b

    SHA256

    60eec3167cba74c14575a372f4f5ded21538abfd4000f92879d2244fbfbd41dd

    SHA512

    6b19def85855f25d664964a0b3e0ef065ed7263b1919f25e05178d320355c113da31b863d1919d3796655cd01a5994a915076c40ade134bc828f6bf5331cfdad

  • memory/1608-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1608-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1608-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1608-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1608-18-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB