Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25-09-2024 09:08

General

  • Target

    31001ce5e611d842b6395b3a23e08007da8d08764c9f425ad3253f621baf9bd9N.exe

  • Size

    83KB

  • MD5

    4a8e47cb4ba25b6843abbcbc251f1c30

  • SHA1

    9eb522020ae4be2edc042f0039ed8be7a23dc3fc

  • SHA256

    31001ce5e611d842b6395b3a23e08007da8d08764c9f425ad3253f621baf9bd9

  • SHA512

    1d80a70c0a87dcd2f34c92a8fbf1d859b8e10ca3e4c9f76fce1ac7ba0fc8c55a0c65c83d9f35a6bdb93815057808ec69dbcbda1d9f81458d4edc39e21da939e6

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+GK:LJ0TAz6Mte4A+aaZx8EnCGVuG

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\31001ce5e611d842b6395b3a23e08007da8d08764c9f425ad3253f621baf9bd9N.exe
    "C:\Users\Admin\AppData\Local\Temp\31001ce5e611d842b6395b3a23e08007da8d08764c9f425ad3253f621baf9bd9N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-1gHA8jEE0hceB9K7.exe

    Filesize

    83KB

    MD5

    b62620f9dd24315b8efa4dff7deee905

    SHA1

    0fbfe401918b4311fccd467fa4dbab8769af173f

    SHA256

    ce4932adc77c2882b8cfa1d17d8984811238c637d81b5fd8ccf2d3a2931a403c

    SHA512

    9dc69f3aa2bcf2d0fbf16f08647403636c4cc11f601b7af22cdca63178b478a0c9af3e0e9c0e2772a68fbd03b6cd9bc6c12a2320af640617530cd68ca7866c13

  • memory/1628-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1628-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1628-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1628-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1628-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB