Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2024, 09:40

General

  • Target

    19ec2ab3fdb201df19dad52fdd53192117e4b6eb50e59d5e655bd931dc97cdb3.exe

  • Size

    15KB

  • MD5

    fcf4c8ba08d1f6177d5996801278e951

  • SHA1

    a306a542b4cd342e19ac01cc8b03cc1ade8363db

  • SHA256

    19ec2ab3fdb201df19dad52fdd53192117e4b6eb50e59d5e655bd931dc97cdb3

  • SHA512

    7eac5a2a086430c14a443a83a8c208cbb379bc8b62e432a9e5b8efd4027e10b3c47d306624cb0b2c6c71c5461ce9ad4588b18f6f81a851ffd2a56a9d63a5d5ba

  • SSDEEP

    384:YQ9h5rTaMlUktE1uE8eBpqgNFHfuoeyPhCiP/QK5tJw41V:Lh5ahkC1xOOBfrCiHf1D1V

Score
5/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19ec2ab3fdb201df19dad52fdd53192117e4b6eb50e59d5e655bd931dc97cdb3.exe
    "C:\Users\Admin\AppData\Local\Temp\19ec2ab3fdb201df19dad52fdd53192117e4b6eb50e59d5e655bd931dc97cdb3.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    PID:5036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5036-0-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/5036-2-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB