Analysis

  • max time kernel
    110s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:20

General

  • Target

    9aae5f69841bf9893f5c16969162f94e6ae0cef377b51f9994753ea393e6a3a8N.exe

  • Size

    83KB

  • MD5

    93b6d72b3c47638f4d62ea0b3b9f1900

  • SHA1

    3e441b5beb35c9a006ad25236e73d4ad4a065702

  • SHA256

    9aae5f69841bf9893f5c16969162f94e6ae0cef377b51f9994753ea393e6a3a8

  • SHA512

    c7ca29e3c77b10b1fee98c4a5f83a38f40b7186de7f65bc3e995a6b1695b311af82129d071e79a73af4dc7be9d74b07b9a2e34b0d1f7a759d38179bafcbac574

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+UK:LJ0TAz6Mte4A+aaZx8EnCGVuU

Score
7/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9aae5f69841bf9893f5c16969162f94e6ae0cef377b51f9994753ea393e6a3a8N.exe
    "C:\Users\Admin\AppData\Local\Temp\9aae5f69841bf9893f5c16969162f94e6ae0cef377b51f9994753ea393e6a3a8N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-x5cIswWmfY4MKnD0.exe

    Filesize

    83KB

    MD5

    c43c1fbbcffa626c354fa355d24f6a9f

    SHA1

    1e96ea7278af5110d1cc55a4cffcdcc5ef5264ed

    SHA256

    fbede10d49e2ffccc8d747db5d0f4a6daeda308c95ce9c5d302cabf45438c1c1

    SHA512

    c68388cf3e2ac60a8fb1dcefdb7b34af4ea0095826d00122caea3e47a68e6729feba0de24c684be61523aeca2c23e70f94358e2995dbafd2a57919560e856779

  • memory/2644-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2644-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2644-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2644-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2644-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB