Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2024, 05:05

General

  • Target

    d16670f2b8116a24e15e32bf9ad4d0f5895b782e08683ca900db8b713636848fN.exe

  • Size

    236KB

  • MD5

    b35338f5e0f63eef7611dbf588527d50

  • SHA1

    6f85fd02a1c7f84237fb96156edb900426495027

  • SHA256

    d16670f2b8116a24e15e32bf9ad4d0f5895b782e08683ca900db8b713636848f

  • SHA512

    20a6ddaf760125799701d93a781365ed31cfa7ea32a8ea67de2eb7d6efb4bb2258837a84f1b575e47d67c7100bb2198a8acb1e6a2fd3283e4ef0b4d6bda14f90

  • SSDEEP

    3072:VJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/A/FnncroP9:fwDeM7iNEkgiOb31k1ECuJ/F

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d16670f2b8116a24e15e32bf9ad4d0f5895b782e08683ca900db8b713636848fN.exe
    "C:\Users\Admin\AppData\Local\Temp\d16670f2b8116a24e15e32bf9ad4d0f5895b782e08683ca900db8b713636848fN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2520

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-8gTgGvOEBTQbCD71.exe

          Filesize

          236KB

          MD5

          1a2148bafd0579b6f51ce635ac2b5e54

          SHA1

          da569c9ecbd937c83d16f3082c158c57c6733f5e

          SHA256

          603c1bec9bac54054de93ac85f33306ba72a9c2e2f1c12562663a103531c1530

          SHA512

          f434fcf23d34f1ab91355ecfb35f36b3c823a67f44ff76f3d23d3b539dded2ca9aba18ab4924f4654cc97948c0adeb25a5fbede7b0b05a0baaae48bf1b12e40d

        • memory/2520-0-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB

        • memory/2520-1-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB