Analysis

  • max time kernel
    140s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2024, 09:45

General

  • Target

    ddb6814c9345ebd3efb32268ee9e586534e091bdc8d1cd96319c1e23114049cc.exe

  • Size

    83KB

  • MD5

    0b04ca6fe5d7d1e7ec82d594bc34747b

  • SHA1

    34876cc41d848930809b76fcc9821c0bae3189e2

  • SHA256

    ddb6814c9345ebd3efb32268ee9e586534e091bdc8d1cd96319c1e23114049cc

  • SHA512

    e050c3ae5b8e4d90567403c70079174ded0c8a905587894ef4755cb8d18f21f4755ae6f9894a772417f2c39538adb0e516039b1a0458850eb919c91d99d0bcfc

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+WKK:LJ0TAz6Mte4A+aaZx8EnCGVuWX

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ddb6814c9345ebd3efb32268ee9e586534e091bdc8d1cd96319c1e23114049cc.exe
    "C:\Users\Admin\AppData\Local\Temp\ddb6814c9345ebd3efb32268ee9e586534e091bdc8d1cd96319c1e23114049cc.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-Ebf8pMMAvbqtAMsm.exe

    Filesize

    83KB

    MD5

    f3f451858cbd85346a7a119f0ea0f7ea

    SHA1

    10d7776b9c0dba9f67460ac8c19ec79884717cf9

    SHA256

    26373d23b5830a9776064209a534e39feca2e56edc41f4504b89574de853687e

    SHA512

    6ff273d10f2f89fddbe1961cc06e4f89255e7d9e06810dd15beb5d09920f283b7ac492e81adec3d4ea9300b5c493fabb0c9ee0789b9f02e54b68736b261bdf5f

  • memory/544-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/544-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/544-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/544-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/544-19-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/544-27-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB