Analysis

  • max time kernel
    111s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 03:43

General

  • Target

    dcd3c4ca59233143e3fc6088a73a1efd6b9093b2cf903fef7f88381609afc688.exe

  • Size

    83KB

  • MD5

    b99d56c370edd67f6f931b8c70907386

  • SHA1

    4ee9fa40e440a89156ecb59be74c4faea7029444

  • SHA256

    dcd3c4ca59233143e3fc6088a73a1efd6b9093b2cf903fef7f88381609afc688

  • SHA512

    adb8107a46865081deeebe95b914e0caaca82216932ecb02f81e77b187f5d5262d2b07ebf840ad14817f22b6de5959df0f664b19d4cbb5d179cfebf8dd4f492a

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+rKa:LJ0TAz6Mte4A+aaZx8EnCGVurN

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\dcd3c4ca59233143e3fc6088a73a1efd6b9093b2cf903fef7f88381609afc688.exe
    "C:\Users\Admin\AppData\Local\Temp\dcd3c4ca59233143e3fc6088a73a1efd6b9093b2cf903fef7f88381609afc688.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-xVja5588pib8R3jQ.exe

    Filesize

    83KB

    MD5

    9c8fb5fad646aeeca31e6563717b2fa5

    SHA1

    4b7282ad74342e45d5003b681122528638803fe2

    SHA256

    636c5adcd27e858a99555d5572339831e0010a096cf89c3e0a0b6dd0329fa6d7

    SHA512

    7dfe230e24794011868ab7d69f1370cb94a898626f74aa95da8c0085d29c01e3fdc10c8e8b8ca454120e3c36cc570cc9d8a6c692cbd5396dee21f9f0d049b35e

  • memory/3792-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3792-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3792-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3792-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3792-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB