Analysis

  • max time kernel
    111s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 11:10

General

  • Target

    83999744c11dd261060f29531f7d32690b4aaf0153f133cef846f5b48314cea2N.exe

  • Size

    83KB

  • MD5

    7f9a98ec790cb1e604fbbf883690e970

  • SHA1

    3d3dd1bfb5c0c66ad9edabc75a624240cbc0833e

  • SHA256

    83999744c11dd261060f29531f7d32690b4aaf0153f133cef846f5b48314cea2

  • SHA512

    de5f59ffc33341af22f8ec6f04d91f7083603e51e07f953685085b850e9bb64c98cef1d4561dbb9ab098cd419768a70b1636f94895df267f8c629372553bbd65

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+JKO:LJ0TAz6Mte4A+aaZx8EnCGVuJP

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\83999744c11dd261060f29531f7d32690b4aaf0153f133cef846f5b48314cea2N.exe
    "C:\Users\Admin\AppData\Local\Temp\83999744c11dd261060f29531f7d32690b4aaf0153f133cef846f5b48314cea2N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-92usE37TVdBDoInT.exe

    Filesize

    83KB

    MD5

    3a54e67580bf034d2cefabdd3ec2eb21

    SHA1

    07682a89593232f24e0e1bc42d387088e47cab50

    SHA256

    97c534c9d511f54b67036c9756e770d08b76614b4160eb3054693f63c7ce3fd9

    SHA512

    188f1984a3b8bd67f6325da4f0dd42522112fee87b7b172a690d9f6301c9cc33f57273829a9fc3e6ecb9242ac40b1b8f9935a0e1bb0b629d615e2074c541bbed

  • memory/4760-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4760-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4760-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4760-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4760-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB