Analysis

  • max time kernel
    110s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-08-2024 06:37

General

  • Target

    7d0e7594c2ffbf81bbba0d9fb911d6b0N.exe

  • Size

    83KB

  • MD5

    7d0e7594c2ffbf81bbba0d9fb911d6b0

  • SHA1

    fbbb4dd2053c7751af9f268801d44c5a06f95372

  • SHA256

    edc68fb701592859e297369457b5b09812e92a731361006bbb2a81946076c5c8

  • SHA512

    64c0e39c600091ab5f4407503b7e8c01dbbecd5bf86c26a603d78ae9c924c66e54bf1c12cc5d7bbbcde60dc80bce4c8e1d081fb381c5caf5e2c737677766e8d0

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+cK:LJ0TAz6Mte4A+aaZx8EnCGVuc

Score
7/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d0e7594c2ffbf81bbba0d9fb911d6b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\7d0e7594c2ffbf81bbba0d9fb911d6b0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-hgseeuPEeHKOBmJs.exe

    Filesize

    83KB

    MD5

    e786b8f7d35538d5b17d2df259ffca92

    SHA1

    c07c57dc21b15f482043ccc694460da95d3152ba

    SHA256

    a2523def758b338597f990d59ca6f14cd7f384d5c11402f5e2338fcba3b1db3e

    SHA512

    9d8936caef5f30c2b0eb36e08f81a5e2f281c871b09760b729acb43f7686dbafe4a1f68b98e24e7c61efef1a431b40e3ef55330624ffe8b0957a602fd7ec507e

  • memory/1488-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1488-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1488-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1488-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1488-21-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB