Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2024, 22:04

General

  • Target

    13e53f055acd883631ee223aa30286f044c6b9cf512318bfcfa325aa16993791N.exe

  • Size

    236KB

  • MD5

    fa2a1aa199d0559040cd5b725b222c80

  • SHA1

    c6a2986fb8509de03e87aeddb2dffe71e0c1c663

  • SHA256

    13e53f055acd883631ee223aa30286f044c6b9cf512318bfcfa325aa16993791

  • SHA512

    edf831aa368f9f07c047ee151541756dea1f3ebbefd38eff43e629cbce6de5540da8e25ed75cd28378e0840e676fb58b9974a77e7127451ebc012f2eca28f3b2

  • SSDEEP

    3072:RJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/J/FnncroP9:bwDeM7iNEkgiOb31k1EClJ/F

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\13e53f055acd883631ee223aa30286f044c6b9cf512318bfcfa325aa16993791N.exe
    "C:\Users\Admin\AppData\Local\Temp\13e53f055acd883631ee223aa30286f044c6b9cf512318bfcfa325aa16993791N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2812

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-b4izXOmjruZtlcHj.exe

          Filesize

          236KB

          MD5

          2705b430f1ee1072d661676673096c74

          SHA1

          c705d400261369d00f98961c90024a8c6cbc0527

          SHA256

          badb41808b076aa407fa1989e96538040d35dddbf2b936cb94ee6538352d4489

          SHA512

          c62135ef520bd1c379078876de716680fcf34b3a6919255c6a90076051015cd6a912bfe5e4b759de47d0357a2d54f42f50bd2252f1feb426e8a19aa5d22f9756

        • memory/2812-0-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB

        • memory/2812-1-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB