Analysis

  • max time kernel
    111s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2024 09:11

General

  • Target

    422b1240e412a0eda277587eac3ba5fff8c2072f39cb71d90950ef8dbd7713d5.exe

  • Size

    83KB

  • MD5

    b04ccd1757587d7efb5c92fe21e8743f

  • SHA1

    53d02057046ac9fd42ad815ac34c874d89d35e82

  • SHA256

    422b1240e412a0eda277587eac3ba5fff8c2072f39cb71d90950ef8dbd7713d5

  • SHA512

    ed44e8e32c267873c58f07c5e5de7eb8adcc6f76208b4552ec1dc7656db457f2108cb09aeb88880d94c35f6837559361e0db279de5d62266a3f76e39aa9281ab

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+EKt:LJ0TAz6Mte4A+aaZx8EnCGVuEW

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\422b1240e412a0eda277587eac3ba5fff8c2072f39cb71d90950ef8dbd7713d5.exe
    "C:\Users\Admin\AppData\Local\Temp\422b1240e412a0eda277587eac3ba5fff8c2072f39cb71d90950ef8dbd7713d5.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-woB16kxXzenQzv8N.exe

    Filesize

    83KB

    MD5

    a2bcf4449886a566d262d8448c2ed2f4

    SHA1

    80d6c415db7222e070647f1ca67ae124319a1252

    SHA256

    44adf60ae8ee3fc416d079d4c9702ce805b4f8f65490365b86dd35468f00bbbe

    SHA512

    935b817747ae2b24c8a55ebc86daa871a625d882f942733212726bdf221fbe4b82561e8902c9f3d32a3b9810a1fb0a118dc419d8111f12d397fe4177f4808d82

  • memory/2404-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2404-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2404-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2404-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2404-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2404-20-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB