Analysis

  • max time kernel
    120s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-11-2024 01:31

General

  • Target

    1623744f3fed4f0d26f9d21aee847294f1bc4a1c1532c627a2e71ad891f03f17N.exe

  • Size

    83KB

  • MD5

    aec0b1f68a7aa95451bf9adc802d2100

  • SHA1

    31dbeaeaee1de48d18cea1b084e13d09fab8c413

  • SHA256

    1623744f3fed4f0d26f9d21aee847294f1bc4a1c1532c627a2e71ad891f03f17

  • SHA512

    672147ab276cc9dda2c45060998ff4b4b507cd6d99bbb0c6231cdf9d703971e76095a2dd2c2f32240ff0e5895a422c3f92ed4a117a149ebefba441e76c51778d

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+oK:LJ0TAz6Mte4A+aaZx8EnCGVuo

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1623744f3fed4f0d26f9d21aee847294f1bc4a1c1532c627a2e71ad891f03f17N.exe
    "C:\Users\Admin\AppData\Local\Temp\1623744f3fed4f0d26f9d21aee847294f1bc4a1c1532c627a2e71ad891f03f17N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-kHrCqcfTmrYthC9E.exe

    Filesize

    83KB

    MD5

    6d17d8387d41e59b56dc3f71ecb0c69b

    SHA1

    cc203ba69a5c8ce0af7ff0861d5097dbd051dc97

    SHA256

    4a120942dd90502562107136fa1fff3b5133c5a907ba71e0c79d813d2eb9724c

    SHA512

    93a5eccf0cecf40d5cf646a6f664d90e6f4176dafbb49b92c1de325403a6b2806c2fbfb71eecfb9e8c4dd51f22831a14216fc3528bb79b5c32a24eaac67e31fe

  • memory/4808-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4808-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4808-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4808-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4808-11-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4808-21-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB