Analysis

  • max time kernel
    111s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-11-2024 06:11

General

  • Target

    a5e4bd1255d1249693e1f9043bd0547b70383d73b09d7cd298ec85d780b1ee50N.exe

  • Size

    83KB

  • MD5

    9dea1f07f9e02096321bfa49faf1b360

  • SHA1

    6514bfcd2728c8d75a33c412da41971ffbf87d03

  • SHA256

    a5e4bd1255d1249693e1f9043bd0547b70383d73b09d7cd298ec85d780b1ee50

  • SHA512

    e438db8550a83b79841316fd28c0d43d2a71395dfa052a6377b2b02194c5218e49c23efb318bea977d2902de4bcaafc1f75d35a5e2158bd1f77e9715bc034158

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+7K:LJ0TAz6Mte4A+aaZx8EnCGVu7

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5e4bd1255d1249693e1f9043bd0547b70383d73b09d7cd298ec85d780b1ee50N.exe
    "C:\Users\Admin\AppData\Local\Temp\a5e4bd1255d1249693e1f9043bd0547b70383d73b09d7cd298ec85d780b1ee50N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-zZuT5mFXt2HLhlUk.exe

    Filesize

    83KB

    MD5

    42bcdf97309e0dd8b1a5e366e54d960d

    SHA1

    fdfdbf1af6dab55f57daa995cd9ff4f64fb4fe20

    SHA256

    0c61b978319d6505c27628cfc1d47c4f4c4ac515b6ca6b99c2d4d97fe42ac914

    SHA512

    2e91c2745b6a3cdcf230ec8d87205229432aa5f20ca41973ba4a88175041ef7f3a614ef485e5b648ffe2583100f3d3da4637d3b9df11b6ae75bc9c336e8d8c12

  • memory/2060-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2060-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2060-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2060-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2060-18-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2060-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB