Analysis

  • max time kernel
    110s
  • max time network
    91s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 14:05

General

  • Target

    8e20af2b077ec3d669249e42bb5644b0N.exe

  • Size

    83KB

  • MD5

    8e20af2b077ec3d669249e42bb5644b0

  • SHA1

    c65844415a8a8cdc0b014f5bca77f111dc06b183

  • SHA256

    35a44cd77da972268e1e4bacea35908a8df24ba6f38248b3847e855dc39f8576

  • SHA512

    c64c7c5436ba43e1a7315852c9a1cd6097bab301e385ec20ffa6eaec1dbf266af82add56abb958b791bec1ab459505f1f5070e56008046e4aa93bd4131ec6d9e

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+PK:LJ0TAz6Mte4A+aaZx8EnCGVuP

Score
7/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e20af2b077ec3d669249e42bb5644b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\8e20af2b077ec3d669249e42bb5644b0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-kI8uGBwo2xLwBRf9.exe

    Filesize

    83KB

    MD5

    08dec8bd2774544c8b6fac35f8f962de

    SHA1

    2af3cae31a08b495554216531bf6cd0e4aae54d4

    SHA256

    6c4cc8ef062b316e3b978a60f6f5526802001115fe158bbba0eb7ab0507719fd

    SHA512

    ca2efa12b47fada064856da2abd2aae9251b773263c5b61d86f7f9a8e6c5c9544a385314cf054dd1c1e25bc635c6fd451ff0e34b3c92fa7769e0b6a073b36887

  • memory/1712-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1712-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1712-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1712-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1712-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB