Analysis

  • max time kernel
    16s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02-08-2024 02:29

General

  • Target

    3ea00d191fdf414e8538dc0aa40862a0N.exe

  • Size

    80KB

  • MD5

    3ea00d191fdf414e8538dc0aa40862a0

  • SHA1

    18a5717bbb0b05c2385255a4126222267adfc9b1

  • SHA256

    67b3ea4edf5fb6359b953cb6017db0bd943f4934d7cffa0238b58edd4572012f

  • SHA512

    9376a6c6342664c6b3879831d2ab7e03b3f28e4ab6cd2bda6adf3acc3df3a2032084a743da3466527f7dd88bac2ba2dbba5f455a7c5a4ee605e29c4b5afe34c1

  • SSDEEP

    1536:5lrsicagdzn8K2ariPOcjk+XQuPVN72NMSWGcxrmcMqD3O:5JjcF8KfCOcjk+guPVjSWGcxpz6

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 33 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ea00d191fdf414e8538dc0aa40862a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\3ea00d191fdf414e8538dc0aa40862a0N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    PID:1700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\macromd\girls gone wild.mpg.exe

    Filesize

    75KB

    MD5

    12d65b75e171c5317ff8c465e227700e

    SHA1

    8f7b6ee19537970fdc725d825bbb6ebc2e8bc8ec

    SHA256

    55f5791aae7189b9dbcadb3cf1f66f48931cbb619ae8cddd479a0933ff0eeb5d

    SHA512

    9e556f9a52c133dfac8daccfbf26a183dc69b8c88bcaa70e9ac2bad4a76bfd922f743dc523be394f0d862b971c90070aecf855a1b287e9bfa655cc1d7eca97f4

  • memory/1700-1-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/1700-35-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB