Analysis

  • max time kernel
    111s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-10-2024 05:47

General

  • Target

    918159c7624ea22f22612aab1c5721ec44baac5b9079e029f26cda88e3385013N.exe

  • Size

    83KB

  • MD5

    d5ce0fa691bb9c771d0efb0da4c28e10

  • SHA1

    88a922b69fa7fc468df1f36836a5fbe6a2e7cc6b

  • SHA256

    918159c7624ea22f22612aab1c5721ec44baac5b9079e029f26cda88e3385013

  • SHA512

    1b42dac4f0d150e4f8aa6e8bcfb69ff4d1113c1680986d15f5f1095ff230c748eeffd08b0d14f599cd108b930df21accfe7be3608ba01d55931b6e027f47d77b

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+GK:LJ0TAz6Mte4A+aaZx8EnCGVuG

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\918159c7624ea22f22612aab1c5721ec44baac5b9079e029f26cda88e3385013N.exe
    "C:\Users\Admin\AppData\Local\Temp\918159c7624ea22f22612aab1c5721ec44baac5b9079e029f26cda88e3385013N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4260

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-UxdvjMiaaAuCWxHX.exe

    Filesize

    83KB

    MD5

    7860978d714af53762ed25acb9443731

    SHA1

    859b28ec953d17e4b672a0fbb6747808b7041cfb

    SHA256

    80d0457c47d85b283c873b64dd659d190032491bc1310441f733e54cf8e4906f

    SHA512

    5b0b1036d07b426a9bdb6402a6e4945954eb513446d98b58db366223f0b3f968b63d887599ec628bcdbfe567dc971caed69ceb1d5d8b512412fcb7cd59a127c0

  • memory/4260-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4260-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4260-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4260-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4260-20-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB