Analysis

  • max time kernel
    17s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/09/2024, 05:37

General

  • Target

    7ebc9fdb9f959431c8bfa72fd25d53a0N.exe

  • Size

    136KB

  • MD5

    7ebc9fdb9f959431c8bfa72fd25d53a0

  • SHA1

    e85df4a9ad40e270e2c14efecc1b7dc28835783f

  • SHA256

    0cd81da46f73247594b8397004e46fcf81ed4492c0e25fd4fd16382fe9ebc2fc

  • SHA512

    2adccc5a50f2705cc1c0d52b5e76854e2e869e26cd386929e0bb9f534d4023861fc3f8058a195e0d7fe404f8a50f14a517109c463ae5200a9e86b87dfd920366

  • SSDEEP

    3072:KQSo7Z+NC9iMGfUSaOy9SnJUwFU+FUhFUeFUXFUqyqKRrpF6Pwy:KQSogNC9iMGsSaOyiZ

Score
7/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7ebc9fdb9f959431c8bfa72fd25d53a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\7ebc9fdb9f959431c8bfa72fd25d53a0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2288-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2288-1-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB