Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 11:56

General

  • Target

    c9b4e8dc8018028ef6cc7e2d804ab12f2749754bff185f310ebfed049a36d451.exe

  • Size

    236KB

  • MD5

    170090b66d3e81cd08c30f9db7bdf852

  • SHA1

    bbeaaf2a2d1314a6954ed899d1cd6e04094d99ec

  • SHA256

    c9b4e8dc8018028ef6cc7e2d804ab12f2749754bff185f310ebfed049a36d451

  • SHA512

    92021ff9901f59a6b21f9d8f2977d68e3221a8dcda6ddcbea7c9b6a2fb54334dc23869c990768adb02c01bc63b5a0cfd0a9a456acf45196431a472d64c4561ac

  • SSDEEP

    3072:MJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/S/FnncroP9t:QwDeM7iNEkgiOb31k1EC0J/Ft

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c9b4e8dc8018028ef6cc7e2d804ab12f2749754bff185f310ebfed049a36d451.exe
    "C:\Users\Admin\AppData\Local\Temp\c9b4e8dc8018028ef6cc7e2d804ab12f2749754bff185f310ebfed049a36d451.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-nKbuOrwOHYGj6UJd.exe

    Filesize

    236KB

    MD5

    c22f862bc8566f0b6b1dbf28db249e43

    SHA1

    fe5ad07e17da9485d020fa762bd95a77a6134ada

    SHA256

    8b578f82328bb7fd1fd2ff62e591864f199b4a4355760ef68fbfe8bf23440b0b

    SHA512

    a8637612fa37bf6d6c2936ddb724b40213620d535418e9e17178a23aa5aa865ce9908f838e258e67cf5c5b2354fc3b1f0cee7c8af82052c6c93b6357e868e2df

  • memory/4212-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/4212-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB