Analysis

  • max time kernel
    90s
  • max time network
    91s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 22:38

General

  • Target

    11c2bac562c08c6e99ec88ecf518eb70N.exe

  • Size

    236KB

  • MD5

    11c2bac562c08c6e99ec88ecf518eb70

  • SHA1

    54d24519972f0d9dded6d283470bd5f484535bdb

  • SHA256

    2fc48d80e4bba1c2b679eee21735eaa3b24d404f32f814017e85e04c0cada2e4

  • SHA512

    bea462d361a654482712132da235785b76c63411082787cdad6922784b60631255b73204b88b32e208f3376903d968e29ad4e35535b5cbbe7a6ce6e138170d3d

  • SSDEEP

    3072:FJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/J/FnncroP9:PwDeM7iNEkgiOb31k1ECFJ/F

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\11c2bac562c08c6e99ec88ecf518eb70N.exe
    "C:\Users\Admin\AppData\Local\Temp\11c2bac562c08c6e99ec88ecf518eb70N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2732

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-AAUg4p4spLKjeA5G.exe

          Filesize

          236KB

          MD5

          7fa2e748c21dc6bd3b7be56b40c29617

          SHA1

          018da06f6ee9fbbe88f60e46e9bbba0da6713d37

          SHA256

          06614672d02492b68c4c5070e14238284436a10e5fbfdfab62a7a0dbe1a81d3d

          SHA512

          fbbf17f6c50b6099c8143b19a17c1b4d2c04460ce9ffb680ccdf2329fe20040ef21a35cb1a3c4cead20f5c981b273531dc20b6a21127d5e4920ff27ad3b18e30

        • memory/2732-0-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB

        • memory/2732-1-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB