Analysis

  • max time kernel
    110s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2024, 08:39

General

  • Target

    8f92ec2df46c8f2da6bf0be187f673718edd97d464652844ad4a01462ca075b0N.exe

  • Size

    83KB

  • MD5

    defaa023bd8cf179a2a0dd4ee8e430d0

  • SHA1

    674dc359e325c6b06cb8cf89b9ebea8539ff1807

  • SHA256

    8f92ec2df46c8f2da6bf0be187f673718edd97d464652844ad4a01462ca075b0

  • SHA512

    d2b9062444e7933cea14631951cfc4fdca27bfffc3b7ec52f16a8492907e966f01680fe82fca5ef01bdf666f8243353b1a51bd504aa4effa1e896ab57527c5f9

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+dK:LJ0TAz6Mte4A+aaZx8EnCGVud

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f92ec2df46c8f2da6bf0be187f673718edd97d464652844ad4a01462ca075b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\8f92ec2df46c8f2da6bf0be187f673718edd97d464652844ad4a01462ca075b0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1672

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-HIXrBWSdZmE27kEw.exe

          Filesize

          83KB

          MD5

          cdecd838d785529fdc6e8005749b55f4

          SHA1

          9e2ead0ab55e00bf2c8df7dc2ce92c79d1b12f83

          SHA256

          6149b4826fecc930d44831d6c2070c9aa53200bbc1b9cf55980a0bf377af3931

          SHA512

          1cb532b8a8f0c873df625b232dddc847eac9b50d894cb68c9f8ef9b4cd86858273a1c75324ede68ed379f4389bb7ef37b7ac40306f1a93abb9bba27d6328fd2b

        • memory/1672-0-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1672-2-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1672-6-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1672-13-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1672-23-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB