Analysis

  • max time kernel
    110s
  • max time network
    99s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 17:36

General

  • Target

    5d08f4238ceb5bc84a88df8da0c9fb00N.exe

  • Size

    83KB

  • MD5

    5d08f4238ceb5bc84a88df8da0c9fb00

  • SHA1

    cd83313476514cc32338ac422277df485f9fbb93

  • SHA256

    73e1083a1d6621c1530ce523a6fd2687a6025d0cd187f195fbe3a722fde671b9

  • SHA512

    d889a2f088495a5b3f0037f369f4f427541c956ea34a84deba3f515f69ed56c91bc43a07621cf9eeb2eef88f7cd9325dcb82b076b04198689969a6f923182a5c

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+5K:LJ0TAz6Mte4A+aaZx8EnCGVu5

Score
7/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d08f4238ceb5bc84a88df8da0c9fb00N.exe
    "C:\Users\Admin\AppData\Local\Temp\5d08f4238ceb5bc84a88df8da0c9fb00N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2396

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-slCG2PEyux5pnrfw.exe

    Filesize

    83KB

    MD5

    648d66c40aeee638d4f5da79796453bd

    SHA1

    4496f9eb280eb508252a7cb701855f999bea240e

    SHA256

    b2feb9fdb6f14f7d9286566a05e07fafbc765551f5e7513c805e8b714c7c0024

    SHA512

    faab2e7fa9bfa2adbd6edc7fb9932f7a34890bb10c7423023a9cc92a0c4f1dee8756d987b24d59b5752292cee65c0984b279fc4bc29a6693592a637f147ad202

  • memory/2396-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2396-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2396-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2396-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2396-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2396-21-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB