Analysis

  • max time kernel
    92s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 18:48

General

  • Target

    27ec730e2c76ca67dfcdffb050d092a61570275611781db1787910f0612cd6c0N.exe

  • Size

    236KB

  • MD5

    18982a1e13253c063bb944410f8bd530

  • SHA1

    b98b990327cd27d288b7614d48164abe995da070

  • SHA256

    27ec730e2c76ca67dfcdffb050d092a61570275611781db1787910f0612cd6c0

  • SHA512

    41dd7e362faa7f9d12bde39cb207f1fab1f09a02fe5e372028d7c8636b721b5c1382b483b5a63a0955027848c77b9e7f33d4ba8e0bf8befc54fdbbfe80120fdc

  • SSDEEP

    3072:xJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/1/FnncroP9:7wDeM7iNEkgiOb31k1EChJ/F

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\27ec730e2c76ca67dfcdffb050d092a61570275611781db1787910f0612cd6c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\27ec730e2c76ca67dfcdffb050d092a61570275611781db1787910f0612cd6c0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-jqlgzfXdhcJ5R91N.exe

    Filesize

    236KB

    MD5

    55760c5ea08db2758f97c8bb9f1b831d

    SHA1

    fb4c7389a85645d76221f8fd33cc2d4987e37782

    SHA256

    93c84798f94671a974cd75c3607378add9fe5c64f1d69ee6f4c6f1c037e33c36

    SHA512

    80576997ea8b259277c09001e0755770a8167e1d4de9b75151fd80fe2f94f17e725ea285ba16f020a43b4169cfa08b65f09691a9f87e2744a1b2d0699474e585

  • memory/1520-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/1520-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB