Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    26-08-2024 03:17

General

  • Target

    3b92d200ee22a7efda940fad833311c0N.exe

  • Size

    193KB

  • MD5

    3b92d200ee22a7efda940fad833311c0

  • SHA1

    ef10b58322b2e11a283edc459d79e8dd8b5669ee

  • SHA256

    e06d95da36fe3b4c28f17af0074e2589e6877f1f1f42045e4110bbbdf693d528

  • SHA512

    72f82a68b671db89e0ab184d725c1f0f765b2ea2a8d3e084f12d68ec33146e094afa17116a4947104f74c631c502e2421ab341f8bb157c96685b4d79ad669034

  • SSDEEP

    3072:fnyiQSox5fIWHIjN3tj6qnv0b2UrXkbvLd:KiQSox5LIjNDv0bNXkbvLd

Score
7/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b92d200ee22a7efda940fad833311c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\3b92d200ee22a7efda940fad833311c0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1056-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1056-1-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB