Analysis

  • max time kernel
    110s
  • max time network
    96s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 06:50

General

  • Target

    af4894c4f0c4ddfd25e6bd6701e43780N.exe

  • Size

    83KB

  • MD5

    af4894c4f0c4ddfd25e6bd6701e43780

  • SHA1

    d9a66cf451c24145de6b374b5f249efb2c0c284c

  • SHA256

    e75da32a1f32867c89ebee720ab7fb2faec2dc601c78e8a29e19bccf06ddb5bf

  • SHA512

    4b4a1bb14c5c88add7d2f5dbe24249a6166cfd5d0fd1ee714c4c6a4087ae2f7588dd2e076612516c092f1f5d1996bf72a315be222779c9b9367ad4e179f8caca

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+dK:LJ0TAz6Mte4A+aaZx8EnCGVud

Score
7/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\af4894c4f0c4ddfd25e6bd6701e43780N.exe
    "C:\Users\Admin\AppData\Local\Temp\af4894c4f0c4ddfd25e6bd6701e43780N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2200

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-RZhcRssoGNlBuLd6.exe

          Filesize

          83KB

          MD5

          9ea546d34e2703aba98a92c4334e5063

          SHA1

          06ec0a613898052bcecc14467ab586bdb7e2534f

          SHA256

          1aba35e2bd91c0ec285ec968e5043bda2e42bc81128d8cff1a93cfb555da8c64

          SHA512

          c11a502becb3e0220a11d4b7aa130a65ffc1e8ee94cc2c31efe338343ec68d3182ca9c8b9a87547433ff004397d0037d75ef392a97b25c63d47c4b355f653bbe

        • memory/2200-0-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2200-1-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2200-4-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2200-8-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2200-15-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2200-22-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB