Analysis

  • max time kernel
    110s
  • max time network
    91s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 05:57

General

  • Target

    542ef16d01d2ca67d2388848241dc970N.exe

  • Size

    83KB

  • MD5

    542ef16d01d2ca67d2388848241dc970

  • SHA1

    ac8e35f0876d6ea7616ed04d3aa815b3a62f94ac

  • SHA256

    ef05047a455cf5881bc8613a53a6920be8b20ca6a4376b1f85132e791a83cfb7

  • SHA512

    2a6f5e76e4a182f2ecaaf48c08a787866a5a651795114844d7b2db281ca52725eb208eccbf8a156909285ee445d9d943abdf626364adfad2b9946c0ca376c9d6

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+fK:LJ0TAz6Mte4A+aaZx8EnCGVuf

Score
7/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\542ef16d01d2ca67d2388848241dc970N.exe
    "C:\Users\Admin\AppData\Local\Temp\542ef16d01d2ca67d2388848241dc970N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2380

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-wt4as6VptLyIVmUX.exe

          Filesize

          83KB

          MD5

          dcbe6cc1a2ae1165fa25cce50de5cfca

          SHA1

          d23eb696c36dd72fb45d2b7707e8326c2abb3689

          SHA256

          6f0f9702ad2bc7a600aca48a26a2d7426debb28a79bc3491bef1920d4aaa076f

          SHA512

          dcc81411aaab98ae5985d7fdcf562b771323578ed740e5d5a0c31a57be9d61ea0bc9cf81e172aa60e0df12763d7772a505f9edc89a32680067264d3425d9c25a

        • memory/2380-0-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2380-1-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2380-7-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2380-14-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2380-22-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB