Analysis

  • max time kernel
    120s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/11/2024, 06:59

General

  • Target

    44c6f29bbee5db3125047c120febfb822fd3373d264d2a6726bbac1a8a52839aN.exe

  • Size

    83KB

  • MD5

    436ec7be2fba3ef3a1b43dc57e79d9e0

  • SHA1

    5aadd77a3e6d62d51774b136b29d5a93a77fca1c

  • SHA256

    44c6f29bbee5db3125047c120febfb822fd3373d264d2a6726bbac1a8a52839a

  • SHA512

    84a5ae7e9b1f906271a117a03eb1eef40f1675246cbccdadd8ee3b61da7fc5662073abb0a63fbd789b3c77f5ffd1b611659a164094c9aeaeb71fa472b60831d6

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+0K:LJ0TAz6Mte4A+aaZx8EnCGVu0

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\44c6f29bbee5db3125047c120febfb822fd3373d264d2a6726bbac1a8a52839aN.exe
    "C:\Users\Admin\AppData\Local\Temp\44c6f29bbee5db3125047c120febfb822fd3373d264d2a6726bbac1a8a52839aN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-mdUNQxa0iEoxZXbk.exe

    Filesize

    83KB

    MD5

    98950a33e099ff9a679ba2acc99d3d1b

    SHA1

    6a8ee31b3630656cd16667b6194953fde0803ac7

    SHA256

    73c1f86ad64b88b2fa872819b1e70a51b38662beb5336b22ae2483b3be020ea4

    SHA512

    a8e55957448034e5b4cdbac00e745c263909889166b95fa9b57983e8bf9564a5bf4ffa61d13e12cdf2cc1f6df033111394cad39f41e1cf86a4ba5b24520514ae

  • memory/2724-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2724-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2724-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2724-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2724-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2724-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB