Analysis

  • max time kernel
    111s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 13:48

General

  • Target

    da9a657a1ca35f979ccd649ab6254aee1c246367b2defc27be60df453b0350d5N.exe

  • Size

    83KB

  • MD5

    c00070020a1374eced5b3ef40daa4140

  • SHA1

    61959e02f544a11166e9745c477bbf26674a82e7

  • SHA256

    da9a657a1ca35f979ccd649ab6254aee1c246367b2defc27be60df453b0350d5

  • SHA512

    77079eb1c2862c10fcfb73db8b7f0265e048c39cd4ea3534f266b1ec56a7dd1eb3e7f8897ff2bfe5189999b00b8504ac3662a78979c3f2126c8427fed8c50834

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+aKe:LJ0TAz6Mte4A+aaZx8EnCGVua3

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\da9a657a1ca35f979ccd649ab6254aee1c246367b2defc27be60df453b0350d5N.exe
    "C:\Users\Admin\AppData\Local\Temp\da9a657a1ca35f979ccd649ab6254aee1c246367b2defc27be60df453b0350d5N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-OOhjWhwD21HCOtF6.exe

    Filesize

    83KB

    MD5

    f409d6655decc79fc1c6dd3fde7fa62b

    SHA1

    0e6df43f47433eb8b12e27e587447925d406a141

    SHA256

    98975ef79e45ee758344c4798934225181eb84aaadc86442f61318e1cca7b705

    SHA512

    24d49ebeed24f9e11b8a17fbd32d5c3b1bcfe6c33c73652d30c54526937d13c231c1e4ee175029c648c47da01d35950bdc86dbbc165fe9dd63be3447afbf87e1

  • memory/4412-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4412-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4412-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4412-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4412-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB