Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2025 06:42

General

  • Target

    a1e90eeabc8aa573e3897f6a3c3629e0eee20728644aa13447eedcde93ef6e30N.exe

  • Size

    236KB

  • MD5

    e627b705464056999e1130fce6c21b30

  • SHA1

    24d071470c4e2407dd4d850a691912177d86e5e7

  • SHA256

    a1e90eeabc8aa573e3897f6a3c3629e0eee20728644aa13447eedcde93ef6e30

  • SHA512

    0d02d5d7c96d588f699f1f710ae99a57609ea9c8446d98243d3033cbb3d9b56dbb31c9207a29bea49be63849085e58bb59d0678549465b4ff0df51e26d462896

  • SSDEEP

    3072:mJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/o/FnncroP9:KwDeM7iNEkgiOb31k1EC2J/F

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1e90eeabc8aa573e3897f6a3c3629e0eee20728644aa13447eedcde93ef6e30N.exe
    "C:\Users\Admin\AppData\Local\Temp\a1e90eeabc8aa573e3897f6a3c3629e0eee20728644aa13447eedcde93ef6e30N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-4w2FFjnx294eDjIe.exe

    Filesize

    236KB

    MD5

    7e5ad2d4008bf645f5eaed8c43e6643c

    SHA1

    59146a4ffac764336bc159a16aa1ce42d7e78b35

    SHA256

    b64794fdecd06bb33a3f119e9e0a148164e2e6ecfa69b9415847ae363faf225b

    SHA512

    928340e129465b329bfc438b3016530155cac1e03d97f7d6c12d09a3783bf91a67c26060356e3b6e528209c1b0e5a91393d2bf2bdd3d006f98a8d256841c5001

  • memory/1792-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/1792-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB