Analysis

  • max time kernel
    119s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-09-2024 23:36

General

  • Target

    807376fe84b212bb74d010584b56446b5ef59c9d0afb6e7042f2d383f907b30eN.exe

  • Size

    83KB

  • MD5

    339872fe4222dbe4a6811a8b3ba55af0

  • SHA1

    ad5d2cfdd15354ea1922ec91062e796e58110ced

  • SHA256

    807376fe84b212bb74d010584b56446b5ef59c9d0afb6e7042f2d383f907b30e

  • SHA512

    a2ecba342a3f552f9fbfad01cc5daed29f1aea668fd45430e966d31def0a3b47d5bab7e95955cb7dd80271983a7817758cf449a7724ef515d96f2dcd205ad58e

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+JK:LJ0TAz6Mte4A+aaZx8EnCGVuJ

Score
7/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\807376fe84b212bb74d010584b56446b5ef59c9d0afb6e7042f2d383f907b30eN.exe
    "C:\Users\Admin\AppData\Local\Temp\807376fe84b212bb74d010584b56446b5ef59c9d0afb6e7042f2d383f907b30eN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-3t1OTObueobq8Qhe.exe

    Filesize

    83KB

    MD5

    5f6bfe86b1481832f66a416992b00a18

    SHA1

    6d19ba3ab42db58c19b5c2ac82b993ff2b28ddd0

    SHA256

    8d4795ec580ecb6352e8e88338e0964af77997169c11e2f3c5e77f9869ec5bd5

    SHA512

    009ea6e72cd9248485a30c0bb593698b2560d22ea3781bd28572972bfc68b4b5724abdab0da783604760e4e35166577b9a8ccb62c314f8ac70351b3cfe4706a5

  • memory/2372-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2372-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2372-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2372-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2372-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB