Analysis

  • max time kernel
    110s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/11/2024, 15:42

General

  • Target

    12bfafb71b96cdb216707e1d405ca94bb370f0f5e129aad379ac073f80a67095N.exe

  • Size

    83KB

  • MD5

    399bb62a231f716d15746ae34ff992c0

  • SHA1

    f9c67ae19bea761758876cc8f31ebd5af72e0548

  • SHA256

    12bfafb71b96cdb216707e1d405ca94bb370f0f5e129aad379ac073f80a67095

  • SHA512

    06d20596322e6237d7922748c4ce0aef8a44d69c4254c34b8727cb1850c33625485d9bd04a8c9bea43ae9fc1ac7392b22d87000599ea6554ef5ac5f9e2108b96

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+5K:LJ0TAz6Mte4A+aaZx8EnCGVu5

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\12bfafb71b96cdb216707e1d405ca94bb370f0f5e129aad379ac073f80a67095N.exe
    "C:\Users\Admin\AppData\Local\Temp\12bfafb71b96cdb216707e1d405ca94bb370f0f5e129aad379ac073f80a67095N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-6OLK4LzmMZbPw4nR.exe

    Filesize

    83KB

    MD5

    d5f7acfc9a17d9a951c36ec01ac46d29

    SHA1

    6f2d11b785376b4ee72def832c35ecec3d8d0a02

    SHA256

    39399c2737f0224ef3063b068817fbe70654f77e8305ff5f62a3b23ada34b6a3

    SHA512

    34c9d962145441e01aa02c963ca077e1ab6d318a04ba7322a442f9e0ce8171853474c690e475bb1b6dab0409bc036e1ebe04d5bfc3578192e2048ceee9a9035e

  • memory/4880-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4880-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4880-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4880-9-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4880-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4880-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB