Analysis

  • max time kernel
    111s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-11-2024 01:29

General

  • Target

    d36fad32e38d5150d3caf32c4651d602bf2d0d78b905c98442c0ac1ba3f9ba38N.exe

  • Size

    83KB

  • MD5

    4d8978a6c5be8379d6866d0c0d472950

  • SHA1

    f25997f20a51b5637100a5fd78b734694bf4676e

  • SHA256

    d36fad32e38d5150d3caf32c4651d602bf2d0d78b905c98442c0ac1ba3f9ba38

  • SHA512

    69a092a2f15a89026a61b1d5b65bf56f8a8b50265b79d1844b252aa8b9ae08bfb0a1165388089ac69c4a02c9dd883109590450a17cac088ed42983c65b30edb9

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+7K:LJ0TAz6Mte4A+aaZx8EnCGVu7

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d36fad32e38d5150d3caf32c4651d602bf2d0d78b905c98442c0ac1ba3f9ba38N.exe
    "C:\Users\Admin\AppData\Local\Temp\d36fad32e38d5150d3caf32c4651d602bf2d0d78b905c98442c0ac1ba3f9ba38N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-eBO0shpzJ9xqtaUs.exe

    Filesize

    83KB

    MD5

    38ade390452e3f39dbb35317ae38dee7

    SHA1

    41734d688ee5be709c0d0731e3541edc6a844fbe

    SHA256

    df1ce53ae69a85cdc8ab7aa19cd51aedbaa5b4c7f8fa6a4546d89fa4fe34a1dd

    SHA512

    eaae9c889e2873dfb844902888f12d50f5c23ce2727402cfc6b2faa4fa56099c847746ff171552c376a3e71b371c6516944005cfe73dd646c6b7ac42736701ec

  • memory/4064-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4064-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4064-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4064-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4064-18-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4064-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB