Analysis

  • max time kernel
    110s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 05:59

General

  • Target

    d641cd14910fc8136e83cdf2e0afd59bed6b74260ab23e8e6cde25be7b79a528N.exe

  • Size

    83KB

  • MD5

    e3715ec8fdd167d2671adbdae045bf60

  • SHA1

    499b125996ac4e081e4213f1f136cc10085f148c

  • SHA256

    d641cd14910fc8136e83cdf2e0afd59bed6b74260ab23e8e6cde25be7b79a528

  • SHA512

    b22880d453986f068700d5d5b1b65a6478ae7f732fcfb16fb6ab66a0176c25546af4a558c444265288881b8792eee808e7c01cbea224f6e5d9de92399ba8801e

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+GK:LJ0TAz6Mte4A+aaZx8EnCGVuG

Score
7/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d641cd14910fc8136e83cdf2e0afd59bed6b74260ab23e8e6cde25be7b79a528N.exe
    "C:\Users\Admin\AppData\Local\Temp\d641cd14910fc8136e83cdf2e0afd59bed6b74260ab23e8e6cde25be7b79a528N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-azSt06gSUW2L5nwv.exe

    Filesize

    83KB

    MD5

    2fb0c18444dd2c60dd7f554123e43211

    SHA1

    903572cb91c95b4219d93a8379689802762bb506

    SHA256

    55e7c8db3f2544f0a210207718d5d9f1469ff9619789f6f7e20317d00b99ba35

    SHA512

    c13e9872d11aae520ddebeb3bbd6f0c6e2a615d4b75ad6de8d7104122423da8ab272de6b1d508365b6111d5c92c28c8f586b7957e51fc825ad4fc4ac7f03c465

  • memory/632-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/632-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/632-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/632-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/632-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB