Analysis

  • max time kernel
    92s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/11/2024, 18:18

General

  • Target

    b00481bbae74360b61f270601e31a63cef0b7e4f57870030790bd4ae11b6484aN.exe

  • Size

    236KB

  • MD5

    923f45524da191b76eb6c04d9acb9e70

  • SHA1

    e410589b924743737f10d618a21754f2f65661fa

  • SHA256

    b00481bbae74360b61f270601e31a63cef0b7e4f57870030790bd4ae11b6484a

  • SHA512

    684d37dc4ef41e4ab85601d2b61657ec1cca72c4ac7166ab2944f594b4a83b29bc44bfe1a348c6e0fafe54ea3edbef33ec063f2fe1c9154ec67d01d731da61a8

  • SSDEEP

    3072:vJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/1/FnncroP9:RwDeM7iNEkgiOb31k1ECRJ/F

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b00481bbae74360b61f270601e31a63cef0b7e4f57870030790bd4ae11b6484aN.exe
    "C:\Users\Admin\AppData\Local\Temp\b00481bbae74360b61f270601e31a63cef0b7e4f57870030790bd4ae11b6484aN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-iHnOpoFFcAtnals1.exe

    Filesize

    236KB

    MD5

    1eebdb3a3b5d654b2801f5455cd7c277

    SHA1

    fb05aba08b8c18b671f2415617468e03565f4e9e

    SHA256

    a042888cde3af97dfa5afc77e8b4aa3a755584fe569717118ed4f0315bf9be97

    SHA512

    d4328f88d57dba9326183df23c59c326bccf9e0ff4737be7bb7ecb2eee85aa24e0fd8167d4d8986e8b9474941eb4dcf21666f42bcb5edb23ebd696d158f52f66

  • memory/1572-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/1572-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB