Analysis

  • max time kernel
    111s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-11-2024 01:23

General

  • Target

    69a7906bef51b6637337f892b70ce444acdf180cd341cadb1fa55b2491038b72N.exe

  • Size

    83KB

  • MD5

    6f98425185ce6c3f2d1de01b52b7fc90

  • SHA1

    9eae6c5d8e21bb1483bb3a501df4b836e29d9d08

  • SHA256

    69a7906bef51b6637337f892b70ce444acdf180cd341cadb1fa55b2491038b72

  • SHA512

    b9550b9cee1f0a10cd9e372106649cbc91bb4653e89a5a00297c73fbef2c8f2dc895f5616664d9563bbde25772f1f9349f3e61c1fdcba4bf8921f84016c4f059

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+SK:LJ0TAz6Mte4A+aaZx8EnCGVuS

Score
5/10

Malware Config

Signatures

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\69a7906bef51b6637337f892b70ce444acdf180cd341cadb1fa55b2491038b72N.exe
    "C:\Users\Admin\AppData\Local\Temp\69a7906bef51b6637337f892b70ce444acdf180cd341cadb1fa55b2491038b72N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2240

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-JjBe9geVaLqONG5Q.exe

    Filesize

    83KB

    MD5

    36997634d69a391f3b0a2d94a05aee6b

    SHA1

    8272ab69937fe4e0a74ddea3ac4f6aef0c61c7ea

    SHA256

    69dfd2b0773fcb3eba4f58cb0c1c9d2af91fd476381114887ad13d1408a39c4c

    SHA512

    5bf262a2971505beeb3b85cd871db081cd32fa7519da77a3b53f3eaebbfacd4060d00afc9c09cd98506ab09ded2cf6dfb9f9f363adb223cd081482fe7d495173

  • memory/2240-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2240-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2240-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2240-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2240-11-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2240-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2240-18-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2240-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB