Analysis

  • max time kernel
    15s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-09-2024 11:33

General

  • Target

    3a2cb29373c49a321e529ea6f2b1d470N.exe

  • Size

    136KB

  • MD5

    3a2cb29373c49a321e529ea6f2b1d470

  • SHA1

    4b192d17f07c734f746a906e6541c7d90faaba09

  • SHA256

    c9bb0d12bad39c21a567e8ad47a86f2b7e980d453871ce1a2079786d26faa9d6

  • SHA512

    ce7cea6f22735319baf6ebc50c1f1e0eda77a81ade41800b56eedd61aec0c1d3478a6533154598217718ed8ad162550fb73c4fa13b0c21d62bbd03af381c5e9b

  • SSDEEP

    1536:V7Zf/FAxTWoJJ7T1vJvGB4QB4dljFEwOxW3o/v7V+n:fny1qBIljKwOgobo

Score
7/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a2cb29373c49a321e529ea6f2b1d470N.exe
    "C:\Users\Admin\AppData\Local\Temp\3a2cb29373c49a321e529ea6f2b1d470N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1788-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1788-1-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB