Analysis

  • max time kernel
    112s
  • max time network
    91s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    05-08-2024 23:43

General

  • Target

    26253630668d6d8549707b90dab962d0N.exe

  • Size

    83KB

  • MD5

    26253630668d6d8549707b90dab962d0

  • SHA1

    840beb0c9e16cde73109a82fc660afda00a6afef

  • SHA256

    35813631f10f22037bca57b15b083f1e9caa21a8d10bc102e8fca5bfd5da124a

  • SHA512

    f2bd9045aa7a7c5aee6a91795145c415ba8264d992a692d18d01a0cab1b821890c01ec70d6c543fdacdabb2f60e005ac408e728fa0a12e0e4364fd828c28da62

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+RK:LJ0TAz6Mte4A+aaZx8EnCGVuR

Score
7/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\26253630668d6d8549707b90dab962d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\26253630668d6d8549707b90dab962d0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-oVNSinVwNb8753i4.exe

    Filesize

    83KB

    MD5

    8b2269886771125294a6551687d80d43

    SHA1

    b6518599e4f76877aa1abc332e300f24d8438352

    SHA256

    c1118ec6463f7ff3543695b1105f41c03148dc9d99949582d3e0fcc59d0b446b

    SHA512

    c1c6071b4d37401759d2fe311e454528bccafc591bd82d3f67542e5ab5e5e4f0971985caaedec6f82442870e0ef6f97bc6a909c007c63213e393a406df55d279

  • memory/2864-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2864-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2864-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2864-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2864-21-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB