Analysis

  • max time kernel
    120s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2024 08:54

General

  • Target

    9e6210473e05c0d1d8efdc168ecf13e7aa0c61e2cf1736043d9e4eaf78feb182N.exe

  • Size

    83KB

  • MD5

    6e7705fbebdce475c0a1afdfb773f150

  • SHA1

    e2e05bfb1dc09baf8931159f7e6d02dda3a30d0f

  • SHA256

    9e6210473e05c0d1d8efdc168ecf13e7aa0c61e2cf1736043d9e4eaf78feb182

  • SHA512

    058dbf2f792e392ace4b950bf8fe8f839df0b12dce6ce90a80d579f06ec67ef4d1981193879ccbcee209915244ba4f01b7289215d45c7040a627851af4b05b98

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+UK+:LJ0TAz6Mte4A+aaZx8EnCGVuUH

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e6210473e05c0d1d8efdc168ecf13e7aa0c61e2cf1736043d9e4eaf78feb182N.exe
    "C:\Users\Admin\AppData\Local\Temp\9e6210473e05c0d1d8efdc168ecf13e7aa0c61e2cf1736043d9e4eaf78feb182N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-zd5LnTeq4du9oTll.exe

    Filesize

    83KB

    MD5

    f63e289042993ea3a0df672aa0a2dd78

    SHA1

    ce1170cc7b2a34dbb7c1522fb03bd61bc64a2a9e

    SHA256

    d5c581e088121384529b4fd2edeca7c8c3d5b468cba21a93af151caa745fe64b

    SHA512

    7dac63afb9a8f89b9e1cdb9af7dfc0d82081976c5414b7c93c1a3bbb3e93f70a556a3f89123c28ae634422ef317597c52c6611b414b66a6e6cc1fd957e4e6e53

  • memory/1028-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1028-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1028-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1028-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1028-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1028-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB