Analysis

  • max time kernel
    111s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/10/2024, 10:43

General

  • Target

    017b723f37208e502eaefe2d8922737ea6a8105cd15046778154b9f4137219e3N.exe

  • Size

    83KB

  • MD5

    3918adfacea748c739f07215dd975cd0

  • SHA1

    548c784166079ba314788ffc963b3e5a80b68848

  • SHA256

    017b723f37208e502eaefe2d8922737ea6a8105cd15046778154b9f4137219e3

  • SHA512

    e6c63d592fc33b3b23bd5bcae6e5e6ccc316f94e0c43af85e5e0e8439592cd2a978701f183d4dbe0acfec100ab5f5b3198c5b1b4dee87bc9641109922ef76d04

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+XK:LJ0TAz6Mte4A+aaZx8EnCGVuX

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\017b723f37208e502eaefe2d8922737ea6a8105cd15046778154b9f4137219e3N.exe
    "C:\Users\Admin\AppData\Local\Temp\017b723f37208e502eaefe2d8922737ea6a8105cd15046778154b9f4137219e3N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-6lkPLWQVYsDjhEbf.exe

    Filesize

    83KB

    MD5

    cfa7a625addf1f4203987e96ccd579c4

    SHA1

    9f634766454d9b85b8e6d0a3cc2823234f2b2ec2

    SHA256

    d4d175de8cf261c6dcadced4ab833b3990645ec67ee1e9820bf2b0efc3b4d4d6

    SHA512

    1e0a7c91c46ddeedad052324ccf424887256ae95e2f3a3cb7c602f839685c7442bd84d8104a1e1abee1e1f67e300c6d9832c735e1b3b9511384df7f343d1a30d

  • memory/624-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/624-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/624-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/624-9-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/624-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/624-20-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB