Analysis

  • max time kernel
    120s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 19:28

General

  • Target

    6d37aac9eba4d57a1cfb5da5e5cfb1947b324f0570ba950c2bc4e944628a7b06N.exe

  • Size

    83KB

  • MD5

    d629aa3ad5b2fb23d72db22f4d15f4b0

  • SHA1

    25a7d8d25da8d674307cf148e7159ea011f63b3f

  • SHA256

    6d37aac9eba4d57a1cfb5da5e5cfb1947b324f0570ba950c2bc4e944628a7b06

  • SHA512

    3d82cdcec668fd0a76e1aa540dfe2072f3dd7d485adce42c3e8fa234262ae4673ed3890df88969f7734e8cbead69377f1637c712ce8d2a8383d34381d576683c

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+JKl:LJ0TAz6Mte4A+aaZx8EnCGVuJu

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d37aac9eba4d57a1cfb5da5e5cfb1947b324f0570ba950c2bc4e944628a7b06N.exe
    "C:\Users\Admin\AppData\Local\Temp\6d37aac9eba4d57a1cfb5da5e5cfb1947b324f0570ba950c2bc4e944628a7b06N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-xzb2gBh9f1ahzjtD.exe

    Filesize

    83KB

    MD5

    faebb1d67c9a92855586f2727d25f88d

    SHA1

    932e37f5ba1ee98b009aecc6490249171c5c80f5

    SHA256

    1c053f653c7fa23f20bac8a852eb56a7edebe35df4ba9814e805bf542aa832cc

    SHA512

    6000020ae660b3828efde020208331e3cc0805b0c2d60611e3068227429a278fd498379a42b0a7624ec4cc58d26d101b2ec3a121717a3d92ad7d3ed89e6b39ea

  • memory/4500-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4500-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4500-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4500-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4500-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB