Analysis

  • max time kernel
    140s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 19:22

General

  • Target

    0955cf6391a936393028f7a97482981466b18dc87c80010e082be497e59740ff.exe

  • Size

    83KB

  • MD5

    16a3825933df21540232b8ed5a31d93c

  • SHA1

    2134b676bb3f6a123bce6bb14fcb4d6d8328cc67

  • SHA256

    0955cf6391a936393028f7a97482981466b18dc87c80010e082be497e59740ff

  • SHA512

    382d8d3633ca447518b26e8b5052c1c33b9841726280261a3bef30c8cc782f2ae52a2fb37b7243ee5d1172c018d8e25ab833f4a4bfbcaec645a4e5e85f480d8c

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+oKV:LJ0TAz6Mte4A+aaZx8EnCGVuoW

Score
5/10

Malware Config

Signatures

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0955cf6391a936393028f7a97482981466b18dc87c80010e082be497e59740ff.exe
    "C:\Users\Admin\AppData\Local\Temp\0955cf6391a936393028f7a97482981466b18dc87c80010e082be497e59740ff.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-vWmdGv1E8DXKTtmI.exe

    Filesize

    83KB

    MD5

    982d109bcd57c4b12f9632292315819c

    SHA1

    0207139dfe2c8660abee71557454dbc4484bf7ca

    SHA256

    df47d39774b9e56ef9f0076fd9a2c0ef4833702093ee9c9da52edf267291be61

    SHA512

    73f73213362d0e2c9ab15d56d2dbe76f5638cb80be7c2a170e8e45b9de728d2a18b589da6ee571fd076a9352bd8f1cfe5a5681bf4925d761410c811f9d766448

  • memory/1720-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1720-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1720-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1720-9-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1720-16-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1720-23-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1720-30-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB