Analysis

  • max time kernel
    110s
  • max time network
    93s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    30/09/2024, 10:44

General

  • Target

    71fc5a2338af24f188ec0abe02d6a646851b8cdf1e1c1ebd75603e2612f3bb2dN.exe

  • Size

    83KB

  • MD5

    cdba0496708aed7dafd401c910ef1e80

  • SHA1

    bb1840f0b9c160ee3bd62c3e63d8da2bfcbfae0e

  • SHA256

    71fc5a2338af24f188ec0abe02d6a646851b8cdf1e1c1ebd75603e2612f3bb2d

  • SHA512

    71f9307b7cbd7f84c583879c8794d70f43d005f00a659688e2cc1c810cc9b0710cdc0e5692428e148026a240ecfc73abda20487ccce63771d26f23e99654bd8b

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+WK:LJ0TAz6Mte4A+aaZx8EnCGVuW

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\71fc5a2338af24f188ec0abe02d6a646851b8cdf1e1c1ebd75603e2612f3bb2dN.exe
    "C:\Users\Admin\AppData\Local\Temp\71fc5a2338af24f188ec0abe02d6a646851b8cdf1e1c1ebd75603e2612f3bb2dN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-9lJcLYDqYIu9Ukrq.exe

    Filesize

    83KB

    MD5

    2e63556467d7055143eb754f7522b5ca

    SHA1

    4b6342d293cd79cf4806b7702d44ac3395095bde

    SHA256

    9a174bd737649b91e71f8daf2504f61c1bc738f2be3ab38595c5fb312b2c776b

    SHA512

    207dd30ca48286940911ffd475edffa320f0aeff101367c7b7f4e50e8a76ee376fa38a556f072395d97676dfaedf879af3b5c387fd4e6567672701848df2a2ad

  • memory/2356-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2356-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2356-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2356-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2356-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB