Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/09/2024, 20:44

General

  • Target

    7fb3a890ab5eb178c41c4ad67bb02ee0N.exe

  • Size

    236KB

  • MD5

    7fb3a890ab5eb178c41c4ad67bb02ee0

  • SHA1

    3e887e9ac5fbeaa9a0338b3875d34c75d3cc253b

  • SHA256

    29db0e2aea0b63439bfabda299034d35df1698ba9071e3353b5fe79e199f5398

  • SHA512

    859d1ab676b486907950a947baceca45c957d4c6f8d96fd13a89b58002b058d9a6c50afadc91f33ed7f65091b0e3b5e852851b2999ad7170c7e4e18394e4225e

  • SSDEEP

    3072:JJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/z/FnncroP9:TwDeM7iNEkgiOb31k1ECjJ/F

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7fb3a890ab5eb178c41c4ad67bb02ee0N.exe
    "C:\Users\Admin\AppData\Local\Temp\7fb3a890ab5eb178c41c4ad67bb02ee0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-dVllqkUSMVF5mK8M.exe

    Filesize

    236KB

    MD5

    f89c834579565f9aa65614f4be40ec37

    SHA1

    8a5416f427a429af58d15b5a8faa10316f8d5483

    SHA256

    da8a5b3389cd9051880e60b636d974dfa32de578917982d9a722325e547d0516

    SHA512

    b634c51e29462bf287d2b52ed6ca3129c5c3cc83a319b97d36a36312ff5d16284a87950d09c3e19f98a8e9a43a628d42d23157ea87d849b8cc2aa55f2fa255f6

  • memory/2616-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/2616-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB