Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/11/2024, 15:31

General

  • Target

    874118a1a66741b0eddbcdbf3a5cae1b7386302e0beb00c7316fc7f4de900ae6N.exe

  • Size

    236KB

  • MD5

    8306e130e40c5c9853843859ed667a90

  • SHA1

    5b61aa0bed8f69c11d1fff4516b917224506416e

  • SHA256

    874118a1a66741b0eddbcdbf3a5cae1b7386302e0beb00c7316fc7f4de900ae6

  • SHA512

    64fbc27eb12cfa1825f33806285fda5bf14ff0967703ece49e4cb545eb7595111f4453fa2df9c6041c9b9b54e43089da9bcb7bab27c0007e03d6fd8363740ea2

  • SSDEEP

    3072:KJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/G/FnncroP9:ewDeM7iNEkgiOb31k1ECYJ/F

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\874118a1a66741b0eddbcdbf3a5cae1b7386302e0beb00c7316fc7f4de900ae6N.exe
    "C:\Users\Admin\AppData\Local\Temp\874118a1a66741b0eddbcdbf3a5cae1b7386302e0beb00c7316fc7f4de900ae6N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-XB3QI21KLz3Voy8C.exe

    Filesize

    236KB

    MD5

    3d131d0c90bc8d6a94e217d750731d62

    SHA1

    9447baf5904ef067b31e2739557c6c20390f55d7

    SHA256

    943b4f609a60351b57677cb5a2177345ccbed1ad6bf246ae11df192433397dca

    SHA512

    b158c4de803c461059211db9456b950b6e4eca6f9afff52ee55e38765c96e21667a28397a57848b8b2e0e1a0fc9c7fd870aeab16a990dfae2aa9e619543c6d37

  • memory/3092-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3092-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB