Analysis

  • max time kernel
    110s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2024, 09:10

General

  • Target

    5d50b49ded452075d162a766679d47b05f74320740aa5fe28facbf540bfa2ccdN.exe

  • Size

    83KB

  • MD5

    652bee01d9191bc3838b79a700499860

  • SHA1

    1d79c9b59a9cfb31cc2fb56e1be791945f25defc

  • SHA256

    5d50b49ded452075d162a766679d47b05f74320740aa5fe28facbf540bfa2ccd

  • SHA512

    020cee162905c2190d8940edef7fad745507f76a3d57b3d1dab6b9dfe6895f5b92d2888b551904ae511c3abffdfa02724e1bdddce9158530a25211cb1446795f

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+gK:LJ0TAz6Mte4A+aaZx8EnCGVug

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d50b49ded452075d162a766679d47b05f74320740aa5fe28facbf540bfa2ccdN.exe
    "C:\Users\Admin\AppData\Local\Temp\5d50b49ded452075d162a766679d47b05f74320740aa5fe28facbf540bfa2ccdN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-8CdGoj7npJteCqzq.exe

    Filesize

    83KB

    MD5

    480c93be77b633ffe717359f9002108c

    SHA1

    752868bcda9fe8359391b64bb276510661e0ccd0

    SHA256

    3df484700b70deb5a01b2d78b1366ba22f852a26b05586f4f3cac48e1ef8b0b6

    SHA512

    ec3793eadd0c41971c655d9326bb8d7817379f7ee921235c31c6e31839e37e61980eb53aa923ae3a8093273257e4ee39aecb680713cbabe5865c6e39038eab17

  • memory/4060-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4060-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4060-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4060-9-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4060-16-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4060-23-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB