Analysis

  • max time kernel
    111s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 04:59

General

  • Target

    d90c422782b5673bed822ec014a896e6123a185065334cef634c932af97845aeN.exe

  • Size

    83KB

  • MD5

    f671c7bb1547814141121dc9957ac1c0

  • SHA1

    e842c0ed2864d507563ddf99a38cb9cf7e863a99

  • SHA256

    d90c422782b5673bed822ec014a896e6123a185065334cef634c932af97845ae

  • SHA512

    419a4ac5d180ae74a8ea93981228ab93d04a10068c9f385d4bada6f89c0d911524d2cbdc3a4e02dbded3136e44e91b23e474eed11a19d02160543d6f2f9faae5

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+7K:LJ0TAz6Mte4A+aaZx8EnCGVu7

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d90c422782b5673bed822ec014a896e6123a185065334cef634c932af97845aeN.exe
    "C:\Users\Admin\AppData\Local\Temp\d90c422782b5673bed822ec014a896e6123a185065334cef634c932af97845aeN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-ibTk30foXIbg6PB4.exe

    Filesize

    83KB

    MD5

    47f313b3abf124705af98caf18d70e80

    SHA1

    c210a512f78aa5948ba4ac426a5d664c82644091

    SHA256

    25490c6e2f6d3d51c488b71c4d3e7dff9be7eca2dbc8eafbbe07d0bbbce1538d

    SHA512

    0948f6ddaeeeb9682ca666cb7ec0b67de15e3bd63cb7eefe27bf06c02d679ad06809474c055ec6d78649f54418cb162ec9a60cf4b374d549e8ce5f30e8300f82

  • memory/4572-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4572-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4572-9-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4572-16-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4572-23-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB