Analysis

  • max time kernel
    111s
  • max time network
    96s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27-09-2024 04:48

General

  • Target

    076b2997a835d08504ee3b47a156d4fa1f0aae2bbfe781ff0baab7d0ec1998a6N.exe

  • Size

    83KB

  • MD5

    a6aaef1250477b0c8c581783bdbd2e20

  • SHA1

    0b7cb6f5eae501e7a66859a0f9faf271c392bc3b

  • SHA256

    076b2997a835d08504ee3b47a156d4fa1f0aae2bbfe781ff0baab7d0ec1998a6

  • SHA512

    e923560a5b7b58dfe6e34f117f59dbc98f4fe3d31c22f1e51093d9052eb84f255d25d31c7c1406f1a50655d603e04467946d474a326e372b344ecb89c6453914

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+dK:LJ0TAz6Mte4A+aaZx8EnCGVud

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\076b2997a835d08504ee3b47a156d4fa1f0aae2bbfe781ff0baab7d0ec1998a6N.exe
    "C:\Users\Admin\AppData\Local\Temp\076b2997a835d08504ee3b47a156d4fa1f0aae2bbfe781ff0baab7d0ec1998a6N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2256

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-fHU6gY6HJ7Cbf0mC.exe

    Filesize

    83KB

    MD5

    dec0e86f2f4d60248e59858ca19e8eab

    SHA1

    e81d236a9bbbccdd9d730701ae8b72365df2f90d

    SHA256

    588615efeecf65f58692da41e25c332a249131acaff9391b36c731f223602808

    SHA512

    5475e94e4a8226da78e6e88906ea067827919168ffaba86c03b8fbebe90e9a3dff26b93e375720bbd7dfdcf8bf5f67b889a06d3c3a7002b5537baf9f22e371a9

  • memory/2256-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2256-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2256-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2256-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2256-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB