Analysis

  • max time kernel
    111s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 16:46

General

  • Target

    eca271630a3276ed8100efd649f87b34dcdec0b10c08c9495b8047a0b89aec49N.exe

  • Size

    83KB

  • MD5

    b31a2cd63eac9a04d2eba57f7368a220

  • SHA1

    e19f2502f64c4bf192fc62267aa1dfed1ca8c1dd

  • SHA256

    eca271630a3276ed8100efd649f87b34dcdec0b10c08c9495b8047a0b89aec49

  • SHA512

    2926ec989d14ddf24f680204e63b39b85856b43dd432539f4eeec7b2df1599852d6858c79c34937a642683d15c393a88ce678dda045068bff23d47ff49a3a47b

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+dK+:LJ0TAz6Mte4A+aaZx8EnCGVudH

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\eca271630a3276ed8100efd649f87b34dcdec0b10c08c9495b8047a0b89aec49N.exe
    "C:\Users\Admin\AppData\Local\Temp\eca271630a3276ed8100efd649f87b34dcdec0b10c08c9495b8047a0b89aec49N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-aO89RTeEAc7Bd3zr.exe

    Filesize

    83KB

    MD5

    6786f4972c788d332659acaf6cb9d74e

    SHA1

    2f251674a61e01968b88b9fc72072ec34cf68db5

    SHA256

    260adca042ba8f340230495c4b595b9e5e9d63c91d5bdafb357293c5d597f092

    SHA512

    d87565da564dd3d502d45c544f2a9ac7021e716f20deab63e0a5dcfd48108822953675fe87d09591b27c2242666df0a92f7f6934686c1b4adeffec7eebae134c

  • memory/644-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/644-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/644-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/644-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/644-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/644-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB