Analysis

  • max time kernel
    111s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/11/2024, 06:56

General

  • Target

    bb5ef9a12945705fb09aa9242da4b93bba5ceefaa54a000ed87d8cac84e39e3cN.exe

  • Size

    83KB

  • MD5

    f306b6137e63a928dc1066c7a5d84740

  • SHA1

    663b30f96491d9a1991acbad72ca8a6e99e4d979

  • SHA256

    bb5ef9a12945705fb09aa9242da4b93bba5ceefaa54a000ed87d8cac84e39e3c

  • SHA512

    2c5a37b6e06ac88e74fe7e3f11d3106c232c1cb8384eb630bdfc45306bb5bc85940a8e1420f4eff98c8b0f569d113cd74a0a01f393fbab540f02f8b3f3e4233b

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+fK:LJ0TAz6Mte4A+aaZx8EnCGVuf

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb5ef9a12945705fb09aa9242da4b93bba5ceefaa54a000ed87d8cac84e39e3cN.exe
    "C:\Users\Admin\AppData\Local\Temp\bb5ef9a12945705fb09aa9242da4b93bba5ceefaa54a000ed87d8cac84e39e3cN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:5076

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-qXyRGy5y7RmwJ6KQ.exe

    Filesize

    83KB

    MD5

    3737f7146567fc09aa04deff93db0428

    SHA1

    0f38aed79fbe5c5e6777926e0e445a6fde69386a

    SHA256

    a3b8c71d408342741d958a2f0a046a111e922189ec1c23f11d5cdc03a4576325

    SHA512

    f27c0093e0d6c974455499673421b2441b0fb78691c0285499c48d4ab5d46cd01c83236c76bfc6b48a099dd37451154e1b830bd753e82335df4510aab29a292b

  • memory/5076-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/5076-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/5076-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/5076-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/5076-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/5076-21-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB