Analysis

  • max time kernel
    119s
  • max time network
    93s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 19:17

General

  • Target

    3313dc532336fc0dece312719c4235825f46059fc89d222d5b72cab5e6b0a624N.exe

  • Size

    83KB

  • MD5

    af0f461b6fef0f27d5961a826b1d9cd0

  • SHA1

    a13971a5e7a4f40d1356156c92d4e20f3625e42b

  • SHA256

    3313dc532336fc0dece312719c4235825f46059fc89d222d5b72cab5e6b0a624

  • SHA512

    d8b8c6c309d746f195bdb404c1113a59f98e90cddf89c8d600544a79992966cb07a4968c5a7f3f1d2752dc452e046cb9b336761809eae103027fdd9d163b667f

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+RK:LJ0TAz6Mte4A+aaZx8EnCGVuR

Score
7/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3313dc532336fc0dece312719c4235825f46059fc89d222d5b72cab5e6b0a624N.exe
    "C:\Users\Admin\AppData\Local\Temp\3313dc532336fc0dece312719c4235825f46059fc89d222d5b72cab5e6b0a624N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-IwDhaaQRVVMaNwFH.exe

    Filesize

    83KB

    MD5

    4151a5ba42a11c5be18fd69ce2bbd0f9

    SHA1

    5b124462daa4b00debebb97db532e548e3468e4d

    SHA256

    ecaa8c3f43c6e95354c7d2fbcf9cb26d43c105c3f65ed6aa7027cd3878b9245d

    SHA512

    560db9bc1c34bc0700d5e3c16cebf9d3190fcdfb0bc291513ea4c294185fdf1342fd7ad05a5430f34d0ae1bd11d5f041c752b5732a12e2a90d70f1847e6a69b7

  • memory/1676-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1676-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1676-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1676-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1676-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB