Analysis

  • max time kernel
    111s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 02:32

General

  • Target

    83d408f7a4dbbd4f0739906d7e5ea0661145e28714aa460b6c26fc4498c9c654N.exe

  • Size

    83KB

  • MD5

    410bb12ba1f003eed5b20cae84fef890

  • SHA1

    8e936640205bc2dbe540579d63646e8e2747e15c

  • SHA256

    83d408f7a4dbbd4f0739906d7e5ea0661145e28714aa460b6c26fc4498c9c654

  • SHA512

    69e91085189dff0a9464e26f7cc47f66875c4176348487ca96027dd7b11e1cc00800d7fda357cb89fe4b9d5df4339dda6b9a2b917e89e0041ce9fd257207d323

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+mK:LJ0TAz6Mte4A+aaZx8EnCGVum

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\83d408f7a4dbbd4f0739906d7e5ea0661145e28714aa460b6c26fc4498c9c654N.exe
    "C:\Users\Admin\AppData\Local\Temp\83d408f7a4dbbd4f0739906d7e5ea0661145e28714aa460b6c26fc4498c9c654N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-49DyE1zfAgF8o0Z9.exe

    Filesize

    83KB

    MD5

    9bfca1cceefbb27293fa2bd77f1709dc

    SHA1

    b15a5b21eb4645a33d68a8cdfa8cc56992628f45

    SHA256

    c7f2daf33f49c489cf55498b654854668342faace2722a53910cee1016a43d32

    SHA512

    c527d66d76a446935a8f502b6280aeb2bcfd6bce800c218f548687dadf95d7c890af5f866739ec1665eacda7b036a0ba91e5566901aef51af632cf10e7f2b39f

  • memory/3092-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3092-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3092-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3092-9-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3092-16-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3092-23-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB