Analysis

  • max time kernel
    110s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/10/2024, 10:39

General

  • Target

    a21f95487fb60c7f03cb1d4cbe7a8c175d7bea9ec4abe2046400c9ef29885393N.exe

  • Size

    83KB

  • MD5

    b84ff3ab289d5c7c01bec9e2600be630

  • SHA1

    1f01acffd8be7b599e3b80111bbbcb3720746fac

  • SHA256

    a21f95487fb60c7f03cb1d4cbe7a8c175d7bea9ec4abe2046400c9ef29885393

  • SHA512

    8264fc1fc4276758652588d86f14d4e5a3b885db07eab6ecfc4e9fe773eca3d5daaf45da661ffd3304ccadf8d7c60c458fcbd75db2315f5bb40e86ee5ee74833

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+gK:LJ0TAz6Mte4A+aaZx8EnCGVug

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a21f95487fb60c7f03cb1d4cbe7a8c175d7bea9ec4abe2046400c9ef29885393N.exe
    "C:\Users\Admin\AppData\Local\Temp\a21f95487fb60c7f03cb1d4cbe7a8c175d7bea9ec4abe2046400c9ef29885393N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:640

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-tYxXh2JpRZekIVq5.exe

          Filesize

          83KB

          MD5

          84a3c3c222f67fe17bb9793b6baa1157

          SHA1

          d64c1ec3aa55240e8ff3ba6ad8b12521635228c0

          SHA256

          09adfd26344bcba6bc546f96f470031d0ee85b9a2419faf3d4436055c08a51ae

          SHA512

          8f90c7db838172af9585f8bdd754dac019650e439ba463ae2a2682dac3d4a718b7eee26b87f21f7975d28a8e45ba64087364d8a28c76b86a394d00c04b48750f

        • memory/640-0-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/640-1-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/640-5-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/640-13-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/640-20-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB