Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 02:56

General

  • Target

    1833aae86cb8cf25bfc9a1e3eebc838a8178f3c8515c987a7b575e12237ffd99N.exe

  • Size

    83KB

  • MD5

    df3158e6ec34b0602dff090fb0b1a3a0

  • SHA1

    5bd1ad417478a3d8e4055bd0a882398d0c7ea67e

  • SHA256

    1833aae86cb8cf25bfc9a1e3eebc838a8178f3c8515c987a7b575e12237ffd99

  • SHA512

    108ed16a49dbc6158d71307b95d4b8087326b1c9e74fb94474fd0c66bb533d4afce2e5df0df6bc3f6f84ad455d5a3b54bd32a61f4211ed775677393bf72a0de3

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF++K:LJ0TAz6Mte4A+aaZx8EnCGVu+

Score
7/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1833aae86cb8cf25bfc9a1e3eebc838a8178f3c8515c987a7b575e12237ffd99N.exe
    "C:\Users\Admin\AppData\Local\Temp\1833aae86cb8cf25bfc9a1e3eebc838a8178f3c8515c987a7b575e12237ffd99N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-eppqk9YFL1wFvLMs.exe

    Filesize

    83KB

    MD5

    4283d6e8545d5e105131562cf3b80fc2

    SHA1

    8c3d419f324b725cb9b4355db7825d99886d9aae

    SHA256

    596a82f7337a41cdd4858c611dc8f693c0eb1bfb8fea8e5f7d1452c6bd32bf9f

    SHA512

    991926fc392eaecd5ae3ca5d01bbe7cd9000820dec927b2aa6a08970c4258d2b134fbada460d8c3cd491efd07b73c0a8a4a71a5bb76f692955fe0b5ed6711a09

  • memory/2720-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2720-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2720-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2720-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2720-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB