Analysis

  • max time kernel
    111s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2024 09:13

General

  • Target

    70315c2f9be7a76a87cc4157cc6c291fed4a1598aa886e1aba5d16ae90f43755N.exe

  • Size

    83KB

  • MD5

    fc230c51828fd7d42bcd932b68892a60

  • SHA1

    7c470626261855483fbf116ff88b754407ca89c1

  • SHA256

    70315c2f9be7a76a87cc4157cc6c291fed4a1598aa886e1aba5d16ae90f43755

  • SHA512

    2a08cfed50313a6bd4b2543aa752adf4354a535a0c5b55195be225895860d649021b64147b20ec474d02e61acc242ce9a50009ceefcca4623347e30553a5b00f

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+hKu:LJ0TAz6Mte4A+aaZx8EnCGVuh/

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\70315c2f9be7a76a87cc4157cc6c291fed4a1598aa886e1aba5d16ae90f43755N.exe
    "C:\Users\Admin\AppData\Local\Temp\70315c2f9be7a76a87cc4157cc6c291fed4a1598aa886e1aba5d16ae90f43755N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3276

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-cZKpOYXmwvxzf5d2.exe

    Filesize

    83KB

    MD5

    a368054d69f59ea91b94c43386553f26

    SHA1

    fc955933fc13655389a8fa292f66527d25d95784

    SHA256

    71b844fae4b9d9110412e218732648aaf3ef7c99e5b9437678fdd96f99bda359

    SHA512

    07a91d52423256d035e0b65db325015c15e027e18314198fe51dedb539c067e76c3f4280554ff1346e0a742c37e2135ac9c7ecd9820c61cf1f8d91a8df25da71

  • memory/3276-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3276-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3276-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3276-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3276-19-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB