Analysis

  • max time kernel
    111s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-10-2024 10:12

General

  • Target

    0247b735c1d2706ec2ede2389f9b46b046d79d40dc01776d73084e2a0355c257N.exe

  • Size

    83KB

  • MD5

    a7ba73b04a1246f0e1a09cfc032d1580

  • SHA1

    a351646e2bdabd44181e73f2d8916d8f215d9308

  • SHA256

    0247b735c1d2706ec2ede2389f9b46b046d79d40dc01776d73084e2a0355c257

  • SHA512

    bee038c570ce52f68820ca334bf6443f6678b2864e5675e64caaa74b015dfd0a3d69bc7b1ba8e6782a9cc96f185098a6760fc325805f18abd897421726ddf2a0

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+AK:LJ0TAz6Mte4A+aaZx8EnCGVuA

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0247b735c1d2706ec2ede2389f9b46b046d79d40dc01776d73084e2a0355c257N.exe
    "C:\Users\Admin\AppData\Local\Temp\0247b735c1d2706ec2ede2389f9b46b046d79d40dc01776d73084e2a0355c257N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-H3QBnLBpwYx0yZee.exe

    Filesize

    83KB

    MD5

    5d90104efe7dfd0cc4599789213ef535

    SHA1

    2fc118081ed72c10eae9b5832209b0909a0284b0

    SHA256

    2d6fa97c32246b76fe55389d8e84b9afa57469717f5881438a3dc53f1d8dbb58

    SHA512

    01385fecf1e9ba53ed261de072b6c5cf2245f2cbc9b6860bdf835526b5206115f9d2e1d93c3e4f45217d4af27a0f37d637987a4000750e06fde54111531731f3

  • memory/4800-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4800-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4800-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4800-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4800-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4800-21-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB