Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-11-2024 01:33

General

  • Target

    1c9f4d59ec4ae6f4bd9ecb79c431384869303a1e12c60e6d00afed26a015a90aN.exe

  • Size

    83KB

  • MD5

    4bc24c9ba5525617cd726f8ca1971510

  • SHA1

    ac4b0b6fd09aabe1036a8146d587003daf7e980b

  • SHA256

    1c9f4d59ec4ae6f4bd9ecb79c431384869303a1e12c60e6d00afed26a015a90a

  • SHA512

    aa7fdcbbd477461cb2a77515c8a41806f1602103253fe0959fafda7f416086f81a02631c3e99eb1023e57cb5acd9a5befb348f83ecc71bfb346d102bed2ae571

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+vK:LJ0TAz6Mte4A+aaZx8EnCGVuv

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c9f4d59ec4ae6f4bd9ecb79c431384869303a1e12c60e6d00afed26a015a90aN.exe
    "C:\Users\Admin\AppData\Local\Temp\1c9f4d59ec4ae6f4bd9ecb79c431384869303a1e12c60e6d00afed26a015a90aN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-pjKcEITHvwCgCS1b.exe

    Filesize

    83KB

    MD5

    19e1665516679f3011ea03eba901e363

    SHA1

    f5dd62cb609dad51e3f8801c47f609cc41659e70

    SHA256

    941a5d0408c365a94a5f554c8fb6b0e15e56032f906b5821f63ad2cc26a7997c

    SHA512

    af837b40e2f92154252dc897bfeb0724a58021490b97c1b75b002ee8860e9a6f85564977f5de07e7efe2eb29511de87c63a4084aa671d2bf9b97efc623c7757e

  • memory/4816-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4816-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4816-9-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4816-16-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4816-23-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB