Analysis

  • max time kernel
    111s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 14:00

General

  • Target

    fdbd523c437ad85be41ee5eed9ad44f5c3f5b98b9fee9f5cf7301051cfee4a44N.exe

  • Size

    83KB

  • MD5

    4520da3184c00f495a1cc820c97d0530

  • SHA1

    cd7eb777aed1963a168155e56c5beeaa553d4a34

  • SHA256

    fdbd523c437ad85be41ee5eed9ad44f5c3f5b98b9fee9f5cf7301051cfee4a44

  • SHA512

    901e1dc4727f783451b6779ad958d47ae0092c69604bad20b1b160e759fa790d413b7235feeedd9232e7ef564698199384c141d5a930ed4cdd76b20a9925114e

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+4K:LJ0TAz6Mte4A+aaZx8EnCGVu4

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fdbd523c437ad85be41ee5eed9ad44f5c3f5b98b9fee9f5cf7301051cfee4a44N.exe
    "C:\Users\Admin\AppData\Local\Temp\fdbd523c437ad85be41ee5eed9ad44f5c3f5b98b9fee9f5cf7301051cfee4a44N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-kOJt0gatHaSzTfGn.exe

    Filesize

    83KB

    MD5

    408cc89e1eea065a9259b780d7a2cf7c

    SHA1

    0d8114c7814a664bd7df2e5bfa5fd98aa74c4126

    SHA256

    2b2ee8cc57fe38293f3e315f12e1979141c69e3deaa8a7dd3c693b086219b977

    SHA512

    7641e0ea8e468fdfc7c106a94e5df74a58aff024583051f660f42a3d806ee9ba9f87d570231304722dbbc279715a4b040b66e4f063732894be4b94bc941a05d3

  • memory/4820-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4820-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4820-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4820-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4820-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB