Analysis

  • max time kernel
    111s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2024 05:16

General

  • Target

    e860058015d391295f97995127a04b68631b9cbb23fa8e8f9472974e28228e07.exe

  • Size

    83KB

  • MD5

    03654d64594d1de702cd2c753b91a2d6

  • SHA1

    2a45d5121341ffc5a1d3d551049cda87dd7da7cb

  • SHA256

    e860058015d391295f97995127a04b68631b9cbb23fa8e8f9472974e28228e07

  • SHA512

    05fc54a62ef0f022207a925d7722be6bb587a39728136b3edef9d188acc635ff0a91cd71b5849b5ebc3f9a370782ab855cc15118446bc81e95b70e62561cc6fa

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+uKq:LJ0TAz6Mte4A+aaZx8EnCGVuuF

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e860058015d391295f97995127a04b68631b9cbb23fa8e8f9472974e28228e07.exe
    "C:\Users\Admin\AppData\Local\Temp\e860058015d391295f97995127a04b68631b9cbb23fa8e8f9472974e28228e07.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-M2WuPXhi4k6ZddfF.exe

    Filesize

    83KB

    MD5

    6904880fff665428632181f38b8d28c5

    SHA1

    6df3d3b949eae854c74f5566e6886b42404b8b51

    SHA256

    f9459d0968a46229d6c18b2e6ccdca2fa9c4132a304b4c5f9698a0e207623322

    SHA512

    44ac941955a5cc26841857ff3d3d35aa9febb666cc1eb681b261d921cb71962133f2d118ec765b5ad6ecafc6f7a77bbe0f6894d83c627d4170bd36c8cb7b2c03

  • memory/3220-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3220-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3220-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3220-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3220-21-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB