Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2024, 11:04

General

  • Target

    ec54d968c1b1d2ae8071204bc147fb1ace65fa37ffe0eaa4e3be1abe00aa50d8N.exe

  • Size

    236KB

  • MD5

    9474e5a6971d2740d7385382b76c1950

  • SHA1

    4a075d99fa92dcd62ed795db8e2f69d65164ad5e

  • SHA256

    ec54d968c1b1d2ae8071204bc147fb1ace65fa37ffe0eaa4e3be1abe00aa50d8

  • SHA512

    618579be6b57bf333be446554de07e1cb83aa27a9a484f11864727b87042e356129ae718dd86ee57a506e796cc75ab2d4814c035ba11172acd63fd685093ca6c

  • SSDEEP

    3072:nJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/v/FnncroP9:JwDeM7iNEkgiOb31k1ECvJ/F

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec54d968c1b1d2ae8071204bc147fb1ace65fa37ffe0eaa4e3be1abe00aa50d8N.exe
    "C:\Users\Admin\AppData\Local\Temp\ec54d968c1b1d2ae8071204bc147fb1ace65fa37ffe0eaa4e3be1abe00aa50d8N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:864

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-38iuAX7oeg7uTQOS.exe

          Filesize

          236KB

          MD5

          b4c8422cd600cb185c7ee4f391697ab2

          SHA1

          00ace9661133751142bb59c7e13d73a261b193ee

          SHA256

          9332362683280854fba227b54e288fe8cf448ba2822cf2a5dce1e4c4f1ee6839

          SHA512

          df56210009d44d0335c74982f827aae9e148c7b01712ea9b1eaa8583d1df419e8267b1d43123bb413f33783117dc76b333bcb9afd01916999d78bc937804698a

        • memory/864-0-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB

        • memory/864-1-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB