Analysis

  • max time kernel
    120s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/07/2024, 01:29

General

  • Target

    7a40eb5bb90c5340a3b5b03234e32220N.exe

  • Size

    83KB

  • MD5

    7a40eb5bb90c5340a3b5b03234e32220

  • SHA1

    e8e7bf34727040e76682ef1b1921305d8a1ec916

  • SHA256

    385757ef387981a2621abb7199a28a1e0fd6d3041bc056fc698b08f61ba99ec2

  • SHA512

    d72281c0252820602bf611c2489d87c54efb41bdd6732c9272f86e33b3e796fbef48a846428141b5a3145a645eead984b790faf6894f30abd06ea1c22d87f0f6

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+AK:LJ0TAz6Mte4A+aaZx8EnCGVuA

Score
7/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a40eb5bb90c5340a3b5b03234e32220N.exe
    "C:\Users\Admin\AppData\Local\Temp\7a40eb5bb90c5340a3b5b03234e32220N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3940

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-D2SRMmps9ugj2jKi.exe

          Filesize

          83KB

          MD5

          567b1c87b1397a1d144d931498e935ef

          SHA1

          70a4132cf1d54717cd77e869b869e38aec540056

          SHA256

          9feb2fec69f8b7515fb495f63014aae872f23c9f0e25ae757a22f529ae061bf1

          SHA512

          45950dd43273628f643c7e3119880626258e889b72c6f319627eea30ccd80d9938c8d106ae8dc41ecd15074de37a13edf92d9ffaf47f29f1a0dd8974c169ec57

        • memory/3940-0-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/3940-1-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/3940-7-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/3940-15-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/3940-22-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB