Analysis

  • max time kernel
    119s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 00:32

General

  • Target

    647cdddaf0fea564ec9fb9aab6858630N.exe

  • Size

    158KB

  • MD5

    647cdddaf0fea564ec9fb9aab6858630

  • SHA1

    e1ad7b79c3f253df263a791756356356be563f09

  • SHA256

    b034c5d4e6d1ddc70c7f45f70822a6c78ae14b8bcd37b12657852bd6c4c3a3d8

  • SHA512

    9d5adb686982c57b1dfb67c81ca326072fab35de37ad10eeed929321b0e11d05c51b7678f84b58824c87574898c2ea4b239f6775e6c18f2ab982af18cf0b31b8

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTNyQYCpwTW7JJZENTNyQYCpXEvBnHHwTVEvBnHHwTU8TmXaI:fny1tEftEvTJ6W2QZwKS7b

Score
7/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\647cdddaf0fea564ec9fb9aab6858630N.exe
    "C:\Users\Admin\AppData\Local\Temp\647cdddaf0fea564ec9fb9aab6858630N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2088

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2088-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2088-1-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB