Analysis

  • max time kernel
    120s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/10/2024, 08:00

General

  • Target

    47199d66bf69ec121992d4f83c3bc130753c487cffa6a0fd24957feba20f6672N.exe

  • Size

    83KB

  • MD5

    f03274bbcb5ee952b0cd2c43d0de5000

  • SHA1

    bf06c6e5c8483e3b0d3cdfebe16569ea300d43e9

  • SHA256

    47199d66bf69ec121992d4f83c3bc130753c487cffa6a0fd24957feba20f6672

  • SHA512

    6a86450f587b080d0470ac1f114414cd669d04c5c61ea09671e7f891820eca4cfce2ec0221b8377cc0a1d7196fdb57ce51d5be1d2a7a7f2d35a6bf116a70bccf

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+zK:LJ0TAz6Mte4A+aaZx8EnCGVuz

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\47199d66bf69ec121992d4f83c3bc130753c487cffa6a0fd24957feba20f6672N.exe
    "C:\Users\Admin\AppData\Local\Temp\47199d66bf69ec121992d4f83c3bc130753c487cffa6a0fd24957feba20f6672N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-SjcbvcKQr1eJs1sP.exe

    Filesize

    83KB

    MD5

    0c27c67906f07ac9a786257d69c6c44f

    SHA1

    74c090404dc3ce3023ba47e78e496d107395eecd

    SHA256

    ef0aabb3357a3d5cf1963121fe39efc8141a76a4c171d1cd1ec0b7a38c8f383d

    SHA512

    11abf36fed5c3072e9d818950a7627030838dc32df7255e8421fadf8615ce4f959140fe76d64e6b0f8c4934d48dbe88be77d4650be454d0654041bbc114fd4b7

  • memory/1988-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1988-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1988-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1988-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1988-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1988-21-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB