Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 04:38

General

  • Target

    c50d4a03e064f64c9c1d37b4b37b97f0N.exe

  • Size

    83KB

  • MD5

    c50d4a03e064f64c9c1d37b4b37b97f0

  • SHA1

    4d066b100df24b3affb42fab72c49516ffbfc562

  • SHA256

    38859e35de8fcbdc2e0522ea7485d18691e2ca7e12c83dcb81a757a89f3b279e

  • SHA512

    1542adc724f75af232da23e228cf772e94f0fb084933c21d1a318c290f54d13c11f4da08f051d188107a129e977cc3f1808a15ee42ae8cbed4dd36d95866920c

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+ZK:LJ0TAz6Mte4A+aaZx8EnCGVuZ

Score
7/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c50d4a03e064f64c9c1d37b4b37b97f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\c50d4a03e064f64c9c1d37b4b37b97f0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-JBkiDwzoI9KQItt0.exe

    Filesize

    83KB

    MD5

    99e5f47a5cba1c408343df26b613a518

    SHA1

    b5964d44d03013019aa581946f103a6da11fa260

    SHA256

    17b6dc3c4dd23d71f90809c52d7c3ac5d1d471becac8dceb838144a558ce8e0d

    SHA512

    64c915bcb205b727ccf9d3ef1c1636b2754bb1142a3479040b1cd1e99ae558391ba812db6fcaf337890176851fbe3d0d0e40928fdcb3c016110c97aa7ea3e2d9

  • memory/2988-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2988-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2988-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2988-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2988-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB