Analysis

  • max time kernel
    111s
  • max time network
    96s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-09-2024 06:07

General

  • Target

    2cb9ba28b2aacee1e8e79e803bbd6f38600fbd4acc4845755ebb9e51c9e13eb5N.exe

  • Size

    83KB

  • MD5

    63c4ae2524197bd91bd3b09ce61aa630

  • SHA1

    9afe1c61e3f6357429285cbe4dc8dd56dba75a9a

  • SHA256

    2cb9ba28b2aacee1e8e79e803bbd6f38600fbd4acc4845755ebb9e51c9e13eb5

  • SHA512

    a1c9240840d72195e0cac1cb2186c84e6f4cd1a4e783359be2d6c35ff87fb60f8e53f5bdbe43f1d1443ae9e4210017de00eca58bac562d5ff42df429bd655365

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+RK:LJ0TAz6Mte4A+aaZx8EnCGVuR

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2cb9ba28b2aacee1e8e79e803bbd6f38600fbd4acc4845755ebb9e51c9e13eb5N.exe
    "C:\Users\Admin\AppData\Local\Temp\2cb9ba28b2aacee1e8e79e803bbd6f38600fbd4acc4845755ebb9e51c9e13eb5N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-9CO19ijc1PNA1CaW.exe

    Filesize

    83KB

    MD5

    6ba25316d2c789fd3049b861a4a973a2

    SHA1

    77f789565f948fc15d6c595724e792eae519d473

    SHA256

    aeeb1ae66dec822a8bfc39b8a3239448da74f43248125416bf8c90a88a8d8c1a

    SHA512

    359aa593537fc4741cb4b163329bba4871def0bd1c63bc749aaa246deff1548099db879dd4d48b63c4d5c0aa4a1eae2428559203114a385ad347f0beb55e67cc

  • memory/2376-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2376-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2376-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2376-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2376-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB