Analysis

  • max time kernel
    110s
  • max time network
    94s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 04:59

General

  • Target

    5db33d9ad2c3d1b1e152500795e4c6e7faf563e00e1fae0fc75fb51f6c77611eN.exe

  • Size

    83KB

  • MD5

    80115c6b84c510cc599a7c7cef3e5790

  • SHA1

    13c999f2782109762978f55db17b5e4b979d3ccb

  • SHA256

    5db33d9ad2c3d1b1e152500795e4c6e7faf563e00e1fae0fc75fb51f6c77611e

  • SHA512

    0703f6544550d2616860d78803002b99fb85d9ac3eef13308a9603a0fbc4107b4f7f63c39de638a032d8bfebfc42bc517bbc431bd8c02f757461b87bad6ce67b

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+bK:LJ0TAz6Mte4A+aaZx8EnCGVub

Score
7/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5db33d9ad2c3d1b1e152500795e4c6e7faf563e00e1fae0fc75fb51f6c77611eN.exe
    "C:\Users\Admin\AppData\Local\Temp\5db33d9ad2c3d1b1e152500795e4c6e7faf563e00e1fae0fc75fb51f6c77611eN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-DLyjHNHX67sZABfc.exe

    Filesize

    83KB

    MD5

    98528ac32192edfcae07d5c6837a2f39

    SHA1

    ba96c86c6f51b7429fb59b66482fe48075cefc8e

    SHA256

    878f9db7f7087091898c771eab6fc5ac1ab9df3331d0bb569ce2e267532de809

    SHA512

    f80dc69fd2f84c230800360b2b690736e92045c661e9ba3c652767b2993c2ed1fef4cc46c4d357033a83b0d746bc3a468e7311235cac0e3a22d1b0e7189ac059

  • memory/2432-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2432-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2432-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2432-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2432-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB