Analysis

  • max time kernel
    112s
  • max time network
    97s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2024, 01:37

General

  • Target

    e9733e8a0e23b039f1b9e2cbf21435c0N.exe

  • Size

    83KB

  • MD5

    e9733e8a0e23b039f1b9e2cbf21435c0

  • SHA1

    6ff0a02868789e711a84c546f7d1f20f0f81476b

  • SHA256

    f195c67b5e218378983b247cba28db8e70a5616679ffbbb3d3c883651ed213d6

  • SHA512

    9df60b173a5de8460918aa3de69daef0fa8b76399b7797422f08d24881cf5f248285137fa0786c454c3daa29f89698e507803fef8e50cc099a3af364f3037783

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+fK:LJ0TAz6Mte4A+aaZx8EnCGVuf

Score
7/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e9733e8a0e23b039f1b9e2cbf21435c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\e9733e8a0e23b039f1b9e2cbf21435c0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-zqyZ4WPUJX9suS6k.exe

    Filesize

    83KB

    MD5

    99a02274fd4c8ba131772855396c2b57

    SHA1

    cb56973c9bdb1c168c202d9d82877570c4114297

    SHA256

    c42ebab1b8cab3fa5b507fdaf29b5857257d15169f9c71a7fac2960b1ce16aa2

    SHA512

    84d94da1dec3e3d4e8b3c35ec3b2cb913b041c8b0c2a0d1b60c22957c175b1f8b3bf4f387ed129ad801083c24c077d16b7d64f785b07d824d3eea8a364d1ab7a

  • memory/2364-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2364-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2364-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2364-11-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2364-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB