Analysis

  • max time kernel
    111s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2024 05:06

General

  • Target

    4219e91bd63e20bad0256da0b25f01af4f94c6ca9ec565462d10eef0e9e89d3bN.exe

  • Size

    83KB

  • MD5

    c21c4df6c871492e09a0c462fc9b6220

  • SHA1

    6eea9bd5c7455e1de0415f2f0a47c5cf7c60ffbc

  • SHA256

    4219e91bd63e20bad0256da0b25f01af4f94c6ca9ec565462d10eef0e9e89d3b

  • SHA512

    41b67d3b3bd8871d4e4ef42fb790e8f94859c39d8109c3bf7cf63b62f61d7e4ce65730c221f366fa694fe6be203769f1bd15d93af52fa6748911b8fdb3009caa

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+6K+:LJ0TAz6Mte4A+aaZx8EnCGVu6n

Score
5/10

Malware Config

Signatures

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4219e91bd63e20bad0256da0b25f01af4f94c6ca9ec565462d10eef0e9e89d3bN.exe
    "C:\Users\Admin\AppData\Local\Temp\4219e91bd63e20bad0256da0b25f01af4f94c6ca9ec565462d10eef0e9e89d3bN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-eaaJBckIqTBDEq55.exe

    Filesize

    83KB

    MD5

    a2e268da0b00e6afc019aa7c9b0800ac

    SHA1

    b987f541f978e3f378d23506188598aad571dea4

    SHA256

    b82d9a6805acb22062728f2e96666869b3afcb230bf81fdc64313b8c4e504b86

    SHA512

    81fada67a83b802ebe57ba153c4ef73e44cf452018d8ecec952f2edf1ddb07a30fb47377804c618d2e2710e277f55f6e707d8eb464b0007d608bb117e819cfc8

  • memory/4316-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4316-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4316-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4316-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4316-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4316-18-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4316-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB