Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23/07/2024, 20:19

General

  • Target

    03e7b39f7479045a6b7955d1c7bf2a60N.exe

  • Size

    83KB

  • MD5

    03e7b39f7479045a6b7955d1c7bf2a60

  • SHA1

    3e79a58c241f2b8ec550018584eeff1c7d9f0fb9

  • SHA256

    f13b61568b8e84e5f6dabba7c128247ef856ecc46a46474d220d3ce19aa133cb

  • SHA512

    aad74400fba24d3b200abd767f972d8ed6f97ee28372ac4529fb181d6d3f61a7d52e170c057d3655f7ec475d675c7b79f281e28b92a05085d00f6622748d5c0d

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+ZK:LJ0TAz6Mte4A+aaZx8EnCGVuZ

Score
7/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\03e7b39f7479045a6b7955d1c7bf2a60N.exe
    "C:\Users\Admin\AppData\Local\Temp\03e7b39f7479045a6b7955d1c7bf2a60N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-pyaQpFRFwoGYgOWx.exe

    Filesize

    83KB

    MD5

    0b3a52f8523c9c230b77f760542e6380

    SHA1

    a5f05b04de8511e6685589dcaad9fbbca833a739

    SHA256

    1035240975fb5b77cd72559c664ff980cee5cc28727f8cba1e0dc3f0c3bcda87

    SHA512

    60bd953473aa5875e49663fc5bfcdd628f20bba2a23ae1ad8d23ad76996557a90fc204c56ad0477d6123ac9ea0b3e3c754f4271cb9ce9dc95092d53525c07655

  • memory/1316-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1316-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1316-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1316-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1316-21-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB