Analysis

  • max time kernel
    111s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2024 05:10

General

  • Target

    3fb704362f984894e7831a7e590d8def4889961e9fb86a39572d41727da3406e.exe

  • Size

    83KB

  • MD5

    23618ba669d5cf725afeeb6a6501dae0

  • SHA1

    0c1a0b33125fc1e54b45281bc94165b46ee88dba

  • SHA256

    3fb704362f984894e7831a7e590d8def4889961e9fb86a39572d41727da3406e

  • SHA512

    e8686b9c12f46a9db8e49595a03a08bb508f325d4f1c7498cca0f4cfbe0fbedb28c06825797045c28b4de0872772a11592a5741c90c02f06e68963fcab04c404

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+nKy:LJ0TAz6Mte4A+aaZx8EnCGVunt

Score
5/10

Malware Config

Signatures

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3fb704362f984894e7831a7e590d8def4889961e9fb86a39572d41727da3406e.exe
    "C:\Users\Admin\AppData\Local\Temp\3fb704362f984894e7831a7e590d8def4889961e9fb86a39572d41727da3406e.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-BTJ1WtEAWvkxvZ3S.exe

    Filesize

    83KB

    MD5

    807db9bc5928b094c4192877b9137c7d

    SHA1

    ebd7014e9bd9f87883d48e6f759a39aa50c3a64c

    SHA256

    7e6dfeb8a97a4c87c9f3af95e31bb553d9ff680326ca311529bc27847b91576b

    SHA512

    a5a31166169ad56644f65e15d99973520164c0209f67b9708fd6b7f6078eed0dc0d3497ae37a718fa8ca7d28abf12a1b003b5decc4db6051f0ea2335e4d95857

  • memory/3364-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3364-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3364-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3364-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3364-11-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3364-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3364-18-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3364-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB