Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    02-08-2024 01:41

General

  • Target

    814c10ce638197481908bbfe81d0223c9a2a5c974b12575fb35b4c2267d08cde.exe

  • Size

    83KB

  • MD5

    41854b936a3dc375cda363c497ed0814

  • SHA1

    9a40179a935a6acafc132bcb836cf48e81fd6b13

  • SHA256

    814c10ce638197481908bbfe81d0223c9a2a5c974b12575fb35b4c2267d08cde

  • SHA512

    4a2ae73daee33779b1fa6866d2ccf51088aad142fe938789945bdf978d5ea8c977bf8a79dd331f1882fd0e2d90a47af9249f2d954c8aba55b327de4239600a05

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+PK:LJ0TAz6Mte4A+aaZx8EnCGVuP

Score
7/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\814c10ce638197481908bbfe81d0223c9a2a5c974b12575fb35b4c2267d08cde.exe
    "C:\Users\Admin\AppData\Local\Temp\814c10ce638197481908bbfe81d0223c9a2a5c974b12575fb35b4c2267d08cde.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-jgLQKbDpwwttTxD1.exe

    Filesize

    83KB

    MD5

    19251910765fed44345da355b56d0673

    SHA1

    dc9efb79c3a7b7885f73d5ee14253ccd05b8e50d

    SHA256

    fe33d96a984189aefa6e5141a705c3edc267c3a36181f1e1f99c43588690ceef

    SHA512

    9a5697e8e506239721b9f02f9eded847d313b22c3866bd32862c90e5f740630a1f13d10dbcd58fe0ecfb818203807b01f7bb9458d229a3c2eba201c14f7499cc

  • memory/2088-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2088-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2088-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2088-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2088-21-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2088-28-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB