Analysis

  • max time kernel
    110s
  • max time network
    99s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 06:59

General

  • Target

    8e08355429d10d2ae6b0a7eeda2379e0N.exe

  • Size

    83KB

  • MD5

    8e08355429d10d2ae6b0a7eeda2379e0

  • SHA1

    b3ceed7dcd92b6aaf1ea62ef76fb9abae846e73e

  • SHA256

    f00de7d299c5505f61075cccaae2e16c45cb992d4322eb43246fcabf01c3f96f

  • SHA512

    79918e8146100ac7df6988f1fdc82387355c1173e7b5075c57d66859d7d8181a5c1ffa836dd85f21cb3ca93cedd96dc31b9e0fef6dc970ba92841f0c87c6a181

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+cK:LJ0TAz6Mte4A+aaZx8EnCGVuc

Score
7/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e08355429d10d2ae6b0a7eeda2379e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\8e08355429d10d2ae6b0a7eeda2379e0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-7NueUBh30c5gwMlV.exe

    Filesize

    83KB

    MD5

    0de9be40d96aab6c9be113b3174bc3f0

    SHA1

    493f802902064d04d09ac95d67c149ce3b728873

    SHA256

    1da29a11c27fcd428444aaca444d842953a281bd5017f6fa47e2c9004fce9f52

    SHA512

    253d29dd3d8221cda634c2feac4e1c39389dbaac4e219dbc3fb29b70ba0f56d7a19eacfd44ad6998a63f4ce52c7223e2ef578128040517c0c766c9dd099b9c80

  • memory/1732-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1732-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1732-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1732-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1732-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1732-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB