Analysis

  • max time kernel
    110s
  • max time network
    93s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 16:38

General

  • Target

    3ca0a81677cc229f45bd576a908f1bef73d12939e45b4f188ce28e9c73ca229dN.exe

  • Size

    83KB

  • MD5

    2a84b412b0f940847ed10eb7be9d8000

  • SHA1

    f8da6df1189311ad17c030a751f550981f2bf4fa

  • SHA256

    3ca0a81677cc229f45bd576a908f1bef73d12939e45b4f188ce28e9c73ca229d

  • SHA512

    3ace36e3c65b622341fdc79e03fd4aa561ac7422bbf1ae75106c739c828106772e5f7c4c1d01d2c9f86e024e6a89226065ed99335e18e949cb08efaf9ddda556

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+gK:LJ0TAz6Mte4A+aaZx8EnCGVug

Score
7/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ca0a81677cc229f45bd576a908f1bef73d12939e45b4f188ce28e9c73ca229dN.exe
    "C:\Users\Admin\AppData\Local\Temp\3ca0a81677cc229f45bd576a908f1bef73d12939e45b4f188ce28e9c73ca229dN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-CJsve9Q4mGYlh4qO.exe

    Filesize

    83KB

    MD5

    69229e24c6239730329c6b7563520ede

    SHA1

    7513ace41bf091e32efa721e270bcbbd7f54215e

    SHA256

    1314e5e6aa1a1c9a916a916d5e0dcbd8c49a33b7643606748f26a87fc99e500a

    SHA512

    abbf662072da1aca68942d88b98a55edea941059eaf9839eda9cf793449942e3c8c1e3f2ffa2db98543d36bc87d864fed62271762ecd4b94f2f5f18aee931e4c

  • memory/2220-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2220-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2220-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2220-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2220-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB