Analysis

  • max time kernel
    120s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 19:25

General

  • Target

    20ec5a2c7f919a06351dbc00202c7d2a4c2dd94adebbca963e08df76f105cb4bN.exe

  • Size

    83KB

  • MD5

    f2e18fd2ffac3293fc0e44156ac82c10

  • SHA1

    4df8ba5adacd9feed0d416d1295c61eea6f89d6d

  • SHA256

    20ec5a2c7f919a06351dbc00202c7d2a4c2dd94adebbca963e08df76f105cb4b

  • SHA512

    4e344139da0e71dd38873511d8968083a15e8363e2150828aef8602d35c488ed64ffb17520b1e98ed6c8282cb154b1bb52585e3e7e97bb76f61986667919ad9d

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+MK:LJ0TAz6Mte4A+aaZx8EnCGVuM

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\20ec5a2c7f919a06351dbc00202c7d2a4c2dd94adebbca963e08df76f105cb4bN.exe
    "C:\Users\Admin\AppData\Local\Temp\20ec5a2c7f919a06351dbc00202c7d2a4c2dd94adebbca963e08df76f105cb4bN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-TqHZl6nXm1hB4sCC.exe

    Filesize

    83KB

    MD5

    89e1210e1bb2d5d9995322f673cb90a2

    SHA1

    925de62a399c1f30697c22ba17289c1fef7f21b8

    SHA256

    5315e623ca6f34da05049c063d0838c5ce03a2e2659b07012d4ddf457f9daf91

    SHA512

    a959b5a0c37872b749823fe75395064363b19363da4d58209383578bf5c2a00a51444fe3a989947cd829bb96d4c27b9797d6defde94e57e8ab0c6c76eb397b8e

  • memory/1956-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1956-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1956-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1956-9-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1956-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1956-20-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB