Analysis

  • max time kernel
    111s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2025 06:45

General

  • Target

    4ca6fb7cd729eb01c20ef07be89f901d97bec79a12a6e6e9a1a2f987746398bb.exe

  • Size

    83KB

  • MD5

    30d1330622f1811894fe12f6ffd7174a

  • SHA1

    1dba1c4db9befc6f325ca1f6ea0c36e7fbd4ceb6

  • SHA256

    4ca6fb7cd729eb01c20ef07be89f901d97bec79a12a6e6e9a1a2f987746398bb

  • SHA512

    0c802e95bdf52f90b7de8727e0a6eab8a7574cc22654a1ac8ee8d252048ef6a82bcb38846d0b6d3e62688909f6c990ee7676e496a0b04d0cc099cd6a6c0c14ab

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+dKq:LJ0TAz6Mte4A+aaZx8EnCGVudF

Score
5/10

Malware Config

Signatures

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ca6fb7cd729eb01c20ef07be89f901d97bec79a12a6e6e9a1a2f987746398bb.exe
    "C:\Users\Admin\AppData\Local\Temp\4ca6fb7cd729eb01c20ef07be89f901d97bec79a12a6e6e9a1a2f987746398bb.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-pDwC0bdg80r7Igek.exe

    Filesize

    83KB

    MD5

    f407a1456142bc6d674c1bde3bcca1e5

    SHA1

    b96cb8d730e30c02870b94ff5388b0c0ce721d82

    SHA256

    01ec0193e4d9a5faabde341eb6f5b579cd07eec114f86058ce2c599a0d4c5491

    SHA512

    627113f37262a3ecebbc54ec10da8a669e05bbccd462a98586a03da1e731559658a6599c86be09b2ce14c834b94cc2ec00336a2fab9110dba39b05b22be385f3

  • memory/2232-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2232-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2232-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2232-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2232-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2232-18-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2232-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB