Analysis

  • max time kernel
    110s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-09-2024 08:40

General

  • Target

    68dd8f4ed61bac535ff94ba79ab31e45c8d98899e4380f9393ba8246eb6042c8N.exe

  • Size

    83KB

  • MD5

    52a5ed53b7f05a12f4de94fc7f77ad90

  • SHA1

    236393f709dce4e70262f2c1b23fcd5f3c0a8275

  • SHA256

    68dd8f4ed61bac535ff94ba79ab31e45c8d98899e4380f9393ba8246eb6042c8

  • SHA512

    ae4b09124586766c6f574c86d20a125d65a86e217ec07ddd48c3c7f3d9f951a70e92a43e652fe1bcd52be17e55583150e18c386bce5f029a8531b227e18ef8e9

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+oK:LJ0TAz6Mte4A+aaZx8EnCGVuo

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\68dd8f4ed61bac535ff94ba79ab31e45c8d98899e4380f9393ba8246eb6042c8N.exe
    "C:\Users\Admin\AppData\Local\Temp\68dd8f4ed61bac535ff94ba79ab31e45c8d98899e4380f9393ba8246eb6042c8N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-m3GMMd1lXeCuOYm9.exe

    Filesize

    83KB

    MD5

    4982f228e7dbd3c044f043c70778f40b

    SHA1

    c7bc74440e36d610e28bdeec85a46b4105b5dfbd

    SHA256

    9b3ef9964c9a5e5429c4002b3498f1ab82bfae52b9987d0e807bf27714346e74

    SHA512

    d9a6b66ad959e7a701545c3765cace431790d9620d155a1674c108cf6701846d5b4155c18445b64bd128b0fe29e1d703d546707a12f2294289a863f1114c0050

  • memory/1864-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1864-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1864-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1864-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1864-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB