Analysis

  • max time kernel
    111s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-10-2024 08:08

General

  • Target

    aa7335627955d66c8e3ee1bd2837cae162618dea3f47b20056442d1fd33bbdbdN.exe

  • Size

    83KB

  • MD5

    f82c90c8a41ec817266893bc6e80f1d0

  • SHA1

    05884fa1eaebc6dd2e7483b5c68d24fcc2c80ea9

  • SHA256

    aa7335627955d66c8e3ee1bd2837cae162618dea3f47b20056442d1fd33bbdbd

  • SHA512

    b7395a6dba9b63895cd8e99156d86fba0c2113594b55b341c173838437e69eb2afcff431304c6b5324ca628b000a2de8a6d2dcdb37ab8919b8a3b4663110e7bc

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF++K:LJ0TAz6Mte4A+aaZx8EnCGVu+

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\aa7335627955d66c8e3ee1bd2837cae162618dea3f47b20056442d1fd33bbdbdN.exe
    "C:\Users\Admin\AppData\Local\Temp\aa7335627955d66c8e3ee1bd2837cae162618dea3f47b20056442d1fd33bbdbdN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-Ll2Qx8w9UFblXaV2.exe

    Filesize

    83KB

    MD5

    87586b48d00699ac11d3a52dbf756d93

    SHA1

    b32b482dd98a2be4ee6bf608fc3baad5e3d35321

    SHA256

    46e6c139a7cb5524391c6b96483a4bc9f36646d1d49aaa79cbbd981a75b8b246

    SHA512

    af3067d1a642b3eef5467cdbf258bdb73ef14b7851525d1cadbee2593530fc1cad0fb2e56d20148b47160dedf4a55d0b09cc20c5e612b7965843500f4a97b79e

  • memory/3156-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3156-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3156-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3156-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3156-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3156-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB