Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:52

General

  • Target

    393f2ea136d48a8bda21ea90ff206f18958058ccb6ebbc80f92c0ee230105f41N.exe

  • Size

    83KB

  • MD5

    62d1f379fb77a800578484347a722430

  • SHA1

    172467b43bad73132d16af65de91161f6bf94b52

  • SHA256

    393f2ea136d48a8bda21ea90ff206f18958058ccb6ebbc80f92c0ee230105f41

  • SHA512

    69b1708cf0c11fe9fc71b76c5796113faa114f24634d1ae4ca929d48eb316cdafab2f179959447f4a886eab484e7241118fedb2b04996476d7bc4234571a6106

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+PK:LJ0TAz6Mte4A+aaZx8EnCGVuP

Score
7/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\393f2ea136d48a8bda21ea90ff206f18958058ccb6ebbc80f92c0ee230105f41N.exe
    "C:\Users\Admin\AppData\Local\Temp\393f2ea136d48a8bda21ea90ff206f18958058ccb6ebbc80f92c0ee230105f41N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-URlkjqYzSkJGbV3J.exe

    Filesize

    83KB

    MD5

    dd885816d8c76dd88a8885755593489d

    SHA1

    8061fce11312a3fce29b14106d04c27902e37879

    SHA256

    91f3d46ee5ae8612582b29659a20fae76f8905b8c84c0f3d484359ea0c430576

    SHA512

    5c304dee377eef81686a43094f06b8d4c5fbe7f3cc4b0cefa7459c38176f00270af922905b01fbf0faab61c95816c16b4433db24a912a11c3076ed637805b3fb

  • memory/2932-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2932-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2932-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2932-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2932-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB