Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 11:40

General

  • Target

    6e58150357d49024ecb7c652787c847146c05c21e7b2f12f8d0f3f675e8a7424.exe

  • Size

    236KB

  • MD5

    797b90f9ff95bb2e1f65f1bd8a6fc0df

  • SHA1

    4150cb2344f40ef31e52a23f74fe283dd91f161f

  • SHA256

    6e58150357d49024ecb7c652787c847146c05c21e7b2f12f8d0f3f675e8a7424

  • SHA512

    1e88534aff416e54026f290cae60a490e0989d66cb37b9d25cb22eeb4f168afcb9d44c860d8adb90d63d70bcf3467fc16029cbe255dafde04abef5003e163b73

  • SSDEEP

    3072:uJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/U/FnncroP9V:ywDeM7iNEkgiOb31k1ECyJ/FV

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e58150357d49024ecb7c652787c847146c05c21e7b2f12f8d0f3f675e8a7424.exe
    "C:\Users\Admin\AppData\Local\Temp\6e58150357d49024ecb7c652787c847146c05c21e7b2f12f8d0f3f675e8a7424.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-aVATElxjeBRPIzJv.exe

    Filesize

    236KB

    MD5

    9ca847faad235f205d31fd15e814c6a7

    SHA1

    3c345437d05b16bcb3becf445e4ec605bbfe01b8

    SHA256

    75174c8ea9b8a0e415827ca74e345adfa21cf5b27233548b4881ee9d6b51e043

    SHA512

    730cb5455346f1d3a44e2cafb45654fbe42cd4441d764d0089ece38ee3e1a16e71082209d02c0520ca8d8d544bac68d744f2a101f8e88009b042591ae12fb5ff

  • memory/3560-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3560-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB