Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 08:18

General

  • Target

    7a7e9120e04ffd8c83a93081f889ab70N.exe

  • Size

    94KB

  • MD5

    7a7e9120e04ffd8c83a93081f889ab70

  • SHA1

    9ded68e782651871f1e3bc79e8ef40e013a1dfb8

  • SHA256

    cd245f51d16f1c4d3058cadc43cec025fe2afdf5ad67f156970e2298c734b4b0

  • SHA512

    38cb1f1139f938ab03cefa56b4e826b5c32a1164759a1bd5f41cbe5046ca8fe3943e53ac1a79abdc074fb375e1530b1300bb2ea7483f9d8837c2cf9fe745127b

  • SSDEEP

    1536:5lrsicagdzn8K2ariPOcjk+XQuPVN72NMSu+DdYzGJn27HF0EYpO3NhOZ1:5JjcF8KfCOcjk+guPVjSu827lA0PO

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 33 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a7e9120e04ffd8c83a93081f889ab70N.exe
    "C:\Users\Admin\AppData\Local\Temp\7a7e9120e04ffd8c83a93081f889ab70N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    PID:3036

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\macromd\Harry Potter and the sorcerors stone.divx.exe

          Filesize

          95KB

          MD5

          6fb31d99fb517cfcd7108422df122e45

          SHA1

          9f6576bd5119cff6193fddbc8ceaafb175aa955e

          SHA256

          725f9e68f61e950e92011933b99063195d4e495e09f918572ee97e880c12070a

          SHA512

          83a80888dbe090821de6dbe145e97248929240a123c7596eeabe8977a3d54725695318ad46e20c364e29160e2f9b0c7a94a578f03b6e946e1acbab66cce63cf1

        • memory/3036-0-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/3036-34-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB