Analysis

  • max time kernel
    110s
  • max time network
    91s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 01:34

General

  • Target

    101e88d434309049326cc62c525398726dffde4f64ca54f1529b7f5edabdf41aN.exe

  • Size

    83KB

  • MD5

    1555c6193a5addda430c77e8709e5e80

  • SHA1

    3aaf1221d8d561973c6f64f13ad8d246466054b5

  • SHA256

    101e88d434309049326cc62c525398726dffde4f64ca54f1529b7f5edabdf41a

  • SHA512

    80f08e89c64cd2343c1820b42fbdf10bd8110815c129a77069014f1d72c37862706c33b88e6bcf884b21baca62d3dfa49b81d7296fec790672807e5cca45838a

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+2K:LJ0TAz6Mte4A+aaZx8EnCGVu2

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\101e88d434309049326cc62c525398726dffde4f64ca54f1529b7f5edabdf41aN.exe
    "C:\Users\Admin\AppData\Local\Temp\101e88d434309049326cc62c525398726dffde4f64ca54f1529b7f5edabdf41aN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1456

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-LEIqEvq2tNJUCQtn.exe

    Filesize

    83KB

    MD5

    edf1bb90cbd57475ae08144d28b5313d

    SHA1

    1053db7deddc4c2c7f9b3439d3c13b8dc93466ed

    SHA256

    93cf1b20cee5318ee1ac93067d109a862dd25410be51125d3236164d79cd8eb4

    SHA512

    0a9ce11a758f1971c3338028491f26a18cca02f9e9e268c75d5ae828ffb6dc952bdb6bb7ba26cb49720d1832be79b1b52f16423f2d0b6b3d71b74fa309e22786

  • memory/1456-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1456-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1456-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1456-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1456-23-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB