Analysis

  • max time kernel
    111s
  • max time network
    98s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-09-2024 15:41

General

  • Target

    18a124f841a18e07fd2c798f6554bb40N.exe

  • Size

    83KB

  • MD5

    18a124f841a18e07fd2c798f6554bb40

  • SHA1

    d737b66f1cedcf336f716a33bb52c04a2861c717

  • SHA256

    198ea10d0f6b5a414ed8d7c4925c73939e58ac1a9ccd826572206ceabae05f7b

  • SHA512

    64b1fe4bbd7a0ba9919f287845a06a89f4dfcdf406ef18759b18cb89ee1e744b68a4e035a405483f88d3015cb66649296e27e831abe4ba3b2cbf6ed7287e6b72

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+DK:LJ0TAz6Mte4A+aaZx8EnCGVuD

Score
7/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\18a124f841a18e07fd2c798f6554bb40N.exe
    "C:\Users\Admin\AppData\Local\Temp\18a124f841a18e07fd2c798f6554bb40N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-CZriGCtmzdXLVxp8.exe

    Filesize

    83KB

    MD5

    f71fe9c6c3e2f2a25cd841c14953f221

    SHA1

    6aec095ec2fc63117d9edf051c2ef45c3cf93bd5

    SHA256

    1da2b0eda6a3582aaf9c842b3edb8b3a604c9750135d89fb72fff429186ef58f

    SHA512

    43a30927cbb74160822ac72ef559372c6a7405bc4e1f3ca6939ad20c89c61d0ab2a114ca99574763d31b992721eb01ef4cb516a4ccc15f75f058fa13bc337d0f

  • memory/2232-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2232-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2232-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2232-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2232-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB