Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27-09-2024 05:20

General

  • Target

    cc9e91b706e008a4cc795e6b6f4963a482804178d25aeffb53299ca48f342815N.exe

  • Size

    236KB

  • MD5

    ce75db7af438190eef5177174b95a490

  • SHA1

    500b7836b477085c8409118d2dfbc3c353780c31

  • SHA256

    cc9e91b706e008a4cc795e6b6f4963a482804178d25aeffb53299ca48f342815

  • SHA512

    b5a4c891a3e8384f119e884c936a1a1270bf4e0b9a9d5905ef2c10f6491367a08f71fdf6441a3713f52128ca373b15cae14ca94184e9592615bfa3caf9092af1

  • SSDEEP

    3072:AJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/7/FnncroP9:kwDeM7iNEkgiOb31k1ECbJ/F

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc9e91b706e008a4cc795e6b6f4963a482804178d25aeffb53299ca48f342815N.exe
    "C:\Users\Admin\AppData\Local\Temp\cc9e91b706e008a4cc795e6b6f4963a482804178d25aeffb53299ca48f342815N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-RRLVgQD6QLLjrzBk.exe

    Filesize

    236KB

    MD5

    ad08e5f41778c16acfebe1ab76edbb8c

    SHA1

    2bd2dd5264e7e3a586ea06470c5a06775629bcc5

    SHA256

    2a1e9ed55a5aaec85454858a1ed33192ee40b5c17411abb9c970b1e603bbc88a

    SHA512

    150670d93b033e83e3f13d17b6bc9c789cb62dca0d529c8a65f90efbcbf9072d78c573425b0244decd56c73acebcba3089a1d293229faee4f21219d345123944

  • memory/2052-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/2052-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB