Analysis

  • max time kernel
    110s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 02:28

General

  • Target

    a1afc7baa60815e0146d0c59adba5d84588eea6e690eefa3e076492041c05943N.exe

  • Size

    83KB

  • MD5

    a69fba4b864eda9e83916804bd5a9150

  • SHA1

    c8fd6ec30f3b5c9178fd3df8bfca9de0e29770c6

  • SHA256

    a1afc7baa60815e0146d0c59adba5d84588eea6e690eefa3e076492041c05943

  • SHA512

    d2c7b582a3f59cb89df364da3800fe5a42db23f3f5f6d8f248a0970c447be108cf352c21987f6937808a8566f11de9aa7e545af542d70938a780b913b6fc4752

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+NK:LJ0TAz6Mte4A+aaZx8EnCGVuN

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1afc7baa60815e0146d0c59adba5d84588eea6e690eefa3e076492041c05943N.exe
    "C:\Users\Admin\AppData\Local\Temp\a1afc7baa60815e0146d0c59adba5d84588eea6e690eefa3e076492041c05943N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-yZlYF8IX5WNYzUBA.exe

    Filesize

    83KB

    MD5

    3734237c90ddcae45d36b6a09ba931b0

    SHA1

    0905b2ab011dffbb073bd128a41037002396f31f

    SHA256

    6eccb659ed976674073aeeb34c2ecd91a1e9264955ac1a4ca53b3bf80d59ffdc

    SHA512

    906a15476fe88d129184e115fee0094431129d73bebade4871449f82ef0c79d6a0593763fd9861cabefad14ccec0e9942715f70f54d8dd12b9ead4795d6d1dcc

  • memory/3880-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3880-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3880-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3880-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3880-19-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB