Analysis

  • max time kernel
    110s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 11:01

General

  • Target

    763440b93358f1841e1dbefbc5b6865ae2c77a78c1d5252df4061a2cc2655acaN.exe

  • Size

    83KB

  • MD5

    ce9f0e08d4b907ec91232033d63753b0

  • SHA1

    18f0332a388979cf7f755164d2a4800730f95e2c

  • SHA256

    763440b93358f1841e1dbefbc5b6865ae2c77a78c1d5252df4061a2cc2655aca

  • SHA512

    17a008fb6f559954ac0b2acb51bc234c3cfd4c1c91c93fdfe62f69ceb84389790b7ec8381a3f2101b2ffa49ad037bce5b3ff3cf422bffe79bcd400e91c73e990

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+XK:LJ0TAz6Mte4A+aaZx8EnCGVuX

Score
7/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\763440b93358f1841e1dbefbc5b6865ae2c77a78c1d5252df4061a2cc2655acaN.exe
    "C:\Users\Admin\AppData\Local\Temp\763440b93358f1841e1dbefbc5b6865ae2c77a78c1d5252df4061a2cc2655acaN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-ksH3R7pjp1zV3uo3.exe

    Filesize

    83KB

    MD5

    91e83d3639770ffd2011fc74143af45b

    SHA1

    1a7f03d5a730dc950a14f35f8b453037f17371a1

    SHA256

    e536804c8b850701fac5a2984e75ac5369f0b5abc95b9c145c48c222474fb882

    SHA512

    cfdb85b032bd0015f62f05cef7e32cb14f1e163f333058aa6b968e294ad81a37b5b648aac9f7db0ae6e7c9ebd75ff9c41c744b285546d60d3e234f7eae06d554

  • memory/2272-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2272-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2272-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2272-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2272-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB