Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-09-2024 01:27

General

  • Target

    19371180951aa10ee31b2e2d6886034ed63fc696c7d0cdb5badabab0bfa85da9N.exe

  • Size

    83KB

  • MD5

    04664d4e02c207300c02c1be2f281bd0

  • SHA1

    6b1c64f9932af025c4550845ac20cb2f002eafb9

  • SHA256

    19371180951aa10ee31b2e2d6886034ed63fc696c7d0cdb5badabab0bfa85da9

  • SHA512

    f99982c8cd5b1bf7a8e251a3eb435bcc30c3da88e9b79003781d9df87eab0c454091eac27974883c1a201ba4176c728c2e94226262becc41a91af82a969418e9

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+bK:LJ0TAz6Mte4A+aaZx8EnCGVub

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\19371180951aa10ee31b2e2d6886034ed63fc696c7d0cdb5badabab0bfa85da9N.exe
    "C:\Users\Admin\AppData\Local\Temp\19371180951aa10ee31b2e2d6886034ed63fc696c7d0cdb5badabab0bfa85da9N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-5nhxMlzN36JG1VMi.exe

    Filesize

    83KB

    MD5

    845513082618000e0dd291a90c9cb3b1

    SHA1

    f154af1947ad21e66a89303094c51f2d8d017c0b

    SHA256

    7f3b32ef170b1aa484e9000b077cc2f7a12037d6460f9e5e14af82e9467efd25

    SHA512

    1666bef0ca2402a7cae60c0406c6abc6f7b05ce3426300691c3a9f5f219f7833855bae8015e7c061f2f8408a80003c9a0ec2daa5d4e1c5a7789923920e294339

  • memory/2068-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2068-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2068-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2068-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2068-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB