Analysis

  • max time kernel
    115s
  • max time network
    116s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2024, 09:23

General

  • Target

    1e0e3e2fc0e96729af4961bce84a3f474fc2415b2ccd3b99e7761ef8a753b796.exe

  • Size

    83KB

  • MD5

    a53c86e7bb5c35bcf2e23889ee86dcb2

  • SHA1

    41566d00e89028f8b19a1960e0e5f082e54c453e

  • SHA256

    1e0e3e2fc0e96729af4961bce84a3f474fc2415b2ccd3b99e7761ef8a753b796

  • SHA512

    172a7cb064204d3f2a3b461a4654ee84b586379b35c1e26ac7426b5bec13cc0c1664d7cbabbd0ec5d2a35507b854794679c284c02d6c571418b0741f8b16e077

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+CKO:LJ0TAz6Mte4A+aaZx8EnCGVuCP

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e0e3e2fc0e96729af4961bce84a3f474fc2415b2ccd3b99e7761ef8a753b796.exe
    "C:\Users\Admin\AppData\Local\Temp\1e0e3e2fc0e96729af4961bce84a3f474fc2415b2ccd3b99e7761ef8a753b796.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2384

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-0sPTaRGI9SC7p1DA.exe

    Filesize

    83KB

    MD5

    2c2d25ad272f8b8f2d8c136c07f84453

    SHA1

    2f9e35a4a4cce5b0880378bccf2899994222e923

    SHA256

    e2748a4d3bca82245596a6eec642f8dd554491b81e6720d5e06d7d0c685a3757

    SHA512

    5a7ffbe5740013de0fb6076b5e22ea27eadc69cf53aca961b2a614aedeeef90c59a451008ffadee3c49d78e4d36a91340f823583974b9c7db92f23ea38b97249

  • memory/2384-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2384-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2384-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2384-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2384-17-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB