Analysis

  • max time kernel
    111s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2024 05:17

General

  • Target

    e24cc096abae0c17e5b9baba8fd3815dcb111aa24ef1ee3610fbc90ea28976b5N.exe

  • Size

    83KB

  • MD5

    91480ae95f15be7001b45f26136c7140

  • SHA1

    5d7cc0e28c6ed5f2c0eadfda6f7afac144f4892e

  • SHA256

    e24cc096abae0c17e5b9baba8fd3815dcb111aa24ef1ee3610fbc90ea28976b5

  • SHA512

    264b204e6cd0473ee133a9e94dc0b878abfd20354faeb2fbb99d9ee42e90f2c248476a38a52ed0834df709cf223276238c4c116d9ab6a330ec659d5d50d68b7f

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+GKu:LJ0TAz6Mte4A+aaZx8EnCGVuGf

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e24cc096abae0c17e5b9baba8fd3815dcb111aa24ef1ee3610fbc90ea28976b5N.exe
    "C:\Users\Admin\AppData\Local\Temp\e24cc096abae0c17e5b9baba8fd3815dcb111aa24ef1ee3610fbc90ea28976b5N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-oxApxmJ8H3pvIWDH.exe

    Filesize

    83KB

    MD5

    d19bbaff88014135d26ea76328d7fced

    SHA1

    2f48b8851ef436d07e20d825e5301ee90d804d3c

    SHA256

    7a2b89dface70eaf8104850242729de97221bbbc63c9316dab83164d8f20168e

    SHA512

    46e571b428f88aff2202326e0bc024bf1798ace7515ff52c77d45833f45f117442bf6d5ab51ceed581f62a14c64ce810b9a62b1e218ac46cdf9c0db2cd8f556b

  • memory/3872-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3872-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3872-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3872-9-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3872-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3872-20-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB