Analysis

  • max time kernel
    110s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 19:08

General

  • Target

    b2028a2f55c67bc0d4f9d67f5b8fd990e5760c8647b10bb4e894f183003c8a2fN.exe

  • Size

    83KB

  • MD5

    d082ccd9273e1b30e2f6a6537a7f4880

  • SHA1

    29385dddc0ee0fc6f73f833997eb89baac986928

  • SHA256

    b2028a2f55c67bc0d4f9d67f5b8fd990e5760c8647b10bb4e894f183003c8a2f

  • SHA512

    37363b327d547e429aad67c0a7ee16534c7a785a10e4c4a481a5c97757e7903b1c52b48b00cf437506fd3242e9f2bfe4c541aef45a9355520993c713c34459d2

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+MK:LJ0TAz6Mte4A+aaZx8EnCGVuM

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2028a2f55c67bc0d4f9d67f5b8fd990e5760c8647b10bb4e894f183003c8a2fN.exe
    "C:\Users\Admin\AppData\Local\Temp\b2028a2f55c67bc0d4f9d67f5b8fd990e5760c8647b10bb4e894f183003c8a2fN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-ODsS0CLAkXSbgWxQ.exe

    Filesize

    83KB

    MD5

    037c44ca1a0710e6f4086acc56341ae5

    SHA1

    73accce44bf03df795f45e6cb6d3b95449150179

    SHA256

    2f72bb7ee45758b4e825d68d8283b28c820268619c1745a7f19d297965c27d9a

    SHA512

    bbc478a900896f989cc1c22a37965576d31f627bc567b41638381545563454cd89a77246abf2e0a905a6460586382469e73ed16160cc4f9c56ca883b6df8d047

  • memory/4196-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4196-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4196-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4196-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4196-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4196-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB