Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 05:25

General

  • Target

    9a524970dc1e808abe3df6e2c67b8a4dcb17e3537b72d763c2e0fdcb89df3a1aN.exe

  • Size

    83KB

  • MD5

    0833f24dd6c2769fd499838bba491bf0

  • SHA1

    b4c4b2d552f56e0dac5c162056956ba5fc58a295

  • SHA256

    9a524970dc1e808abe3df6e2c67b8a4dcb17e3537b72d763c2e0fdcb89df3a1a

  • SHA512

    d015fe3e9182a5135203b04dcfc3a5a4a0c3ebf95d4b01024dae12c784e0aaf1f01efe868b694eccd1cd898eead462baf97034cd8b0cc480fae4cda86ec23d4c

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+/K:LJ0TAz6Mte4A+aaZx8EnCGVu/

Score
7/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9a524970dc1e808abe3df6e2c67b8a4dcb17e3537b72d763c2e0fdcb89df3a1aN.exe
    "C:\Users\Admin\AppData\Local\Temp\9a524970dc1e808abe3df6e2c67b8a4dcb17e3537b72d763c2e0fdcb89df3a1aN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-LJJ5dg9vSTYGz6lQ.exe

    Filesize

    83KB

    MD5

    46fa510a08d7e760e85eace477f8f5dc

    SHA1

    87810125ff58698e2a9e0b751af07e056e038afe

    SHA256

    1f2e8e67d8819c0b397f45a33161ca71e28d85e8f324b8802e3e754cebc4c1c3

    SHA512

    fe7548c804c464a93c519920fc4a7469303eab0f60760922e1a051757478b9dfcf0ae8a18027a6ba8e6cadd872efabe5ba1f8ea551e04e174a5b81ad0c254ab0

  • memory/2368-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2368-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2368-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2368-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2368-23-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB