Analysis

  • max time kernel
    112s
  • max time network
    91s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    03/08/2024, 07:24

General

  • Target

    6a78f384911b94649c8810ee68889bb0N.exe

  • Size

    83KB

  • MD5

    6a78f384911b94649c8810ee68889bb0

  • SHA1

    537e1d68bc8a82bd17ac16fb38b946c1f22c92bf

  • SHA256

    37750d2dcda7f3fda4f29953297d0e45b1f0169599bc19ef35b84039692cf2a2

  • SHA512

    ad40aead3a202564ece8fff1fcd2f562f51971caa76f5527f207372d9efe8184bdce06f58005cbf5e75b46df62bdce60a4b0d6063b461a5bd2cce6c8a1a6e9f8

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+RK:LJ0TAz6Mte4A+aaZx8EnCGVuR

Score
7/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a78f384911b94649c8810ee68889bb0N.exe
    "C:\Users\Admin\AppData\Local\Temp\6a78f384911b94649c8810ee68889bb0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-aCkb1i3MuSqi698H.exe

    Filesize

    83KB

    MD5

    48d02d1bde03f8a8fe89ba3fc19242f1

    SHA1

    9630e65af0ca5f8fa967035fd7cbfee6cf5e82be

    SHA256

    dd4349f96fcde5456cd6ed4f8c7f45b630cf9e18fa57f38384f5e730fa44f610

    SHA512

    8238e063d82417037a36bd8c8409892e7852ecff40a5e5bf31018c1c98371d14c58ce8f28ff03e3258d7ac63a44341b2ed089771d26876b65c1182daa136deed

  • memory/2408-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2408-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2408-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2408-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2408-21-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB