Analysis

  • max time kernel
    111s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 16:25

General

  • Target

    34d0991e0fdb23d580cb1cf5df5141b4bfc9ee3319e28140c9d3344ca90ec692.exe

  • Size

    83KB

  • MD5

    c65171652982f5d7ad53861075fb6d84

  • SHA1

    8d277366eded5a59f6dac376d209aeaee49063e3

  • SHA256

    34d0991e0fdb23d580cb1cf5df5141b4bfc9ee3319e28140c9d3344ca90ec692

  • SHA512

    989f1390f67649206a8bf5c97847c99a453fec8cc378d36edcc94b8b728572fcc7e2bb59976b9d553e9ca68043362e301fadfad8a827f0bb39ef2f514bb693f2

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF++K6:LJ0TAz6Mte4A+aaZx8EnCGVu+d

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\34d0991e0fdb23d580cb1cf5df5141b4bfc9ee3319e28140c9d3344ca90ec692.exe
    "C:\Users\Admin\AppData\Local\Temp\34d0991e0fdb23d580cb1cf5df5141b4bfc9ee3319e28140c9d3344ca90ec692.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:5012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-lrql7v55jvrcAAwb.exe

    Filesize

    83KB

    MD5

    a75a4993cd2fef5e13413dbb83b60980

    SHA1

    d2e6ef38c1ded65b001b505dcbf31f8284e75dfc

    SHA256

    39c4428fd41b0a065034b9928ed38c3326399aae540d6ae2ee6a135735f0d869

    SHA512

    5a3c32bc76ef12ff9967d0e90e42ac25e2b89271bd84d4e9dbbec03833110be0b79575526f11f133964a4e1f11f0243417d493622ed440ea2dd68e6189ce813d

  • memory/5012-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/5012-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/5012-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/5012-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/5012-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB