Analysis

  • max time kernel
    110s
  • max time network
    91s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29/09/2024, 22:44

General

  • Target

    33fa15563409b4ab528d94f675296c488ec5be70c8e7a27189243b2280d06ebdN.exe

  • Size

    83KB

  • MD5

    b8b129cda87d889c1624f9d4231b33e0

  • SHA1

    1efae9b40331cdac167a6e366a5704ac9a52ed8f

  • SHA256

    33fa15563409b4ab528d94f675296c488ec5be70c8e7a27189243b2280d06ebd

  • SHA512

    a43fee687daea96c2d474879c43a4edb2c0c54ba26d94de38bbd9ca83632245042d441ad6ce3b3c7801fa084b0a972394bbbb70b153bf983dec4872a4001b604

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+MK:LJ0TAz6Mte4A+aaZx8EnCGVuM

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\33fa15563409b4ab528d94f675296c488ec5be70c8e7a27189243b2280d06ebdN.exe
    "C:\Users\Admin\AppData\Local\Temp\33fa15563409b4ab528d94f675296c488ec5be70c8e7a27189243b2280d06ebdN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-hi5Rovk5Bpolge5R.exe

    Filesize

    83KB

    MD5

    fcc3c1ed94a2f80dbb89752254d642f1

    SHA1

    10ba9307195c1b796c4b64603fbb24395ffd744f

    SHA256

    3d0863e17393b02f5bb55895b156f77fc2b4025890d8e83bf0f99d9178fce6d7

    SHA512

    c489f929d863cce986a8e9584deecdd94b5d6e277b1b69302a8acb98ab688972bac68ef2a449ac5ddea8a018fc890cdeb7bc2011e8f037796f50798eab2e4ae8

  • memory/2508-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2508-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2508-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2508-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2508-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB