Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2024, 21:14

General

  • Target

    5260c5f0bdfb40c819ea1fa2ca6846298f412042a3285caf514d918c4880461eN.exe

  • Size

    83KB

  • MD5

    ffeb50ea1e4986b731a00e558def98a0

  • SHA1

    2dfaae65040f76e371aff0add6f80d908ad456e9

  • SHA256

    5260c5f0bdfb40c819ea1fa2ca6846298f412042a3285caf514d918c4880461e

  • SHA512

    812ed9263b37bb2d041c225da0981dd31ae4b4eefea988d396b24e42c0fda0684b1d88edb3192c7686121076f5b045d0e7be0c1b008c7c4313c7d53f5bb5b48f

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+nK:LJ0TAz6Mte4A+aaZx8EnCGVun

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5260c5f0bdfb40c819ea1fa2ca6846298f412042a3285caf514d918c4880461eN.exe
    "C:\Users\Admin\AppData\Local\Temp\5260c5f0bdfb40c819ea1fa2ca6846298f412042a3285caf514d918c4880461eN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-vevhmOVtKSmxCvhj.exe

    Filesize

    83KB

    MD5

    d37fa6a0194f2a967f2026a08432a5ac

    SHA1

    437cbd9aa18997b91448ee3d86c9c775c66e17ad

    SHA256

    3460e5c1ea5e9c64bb494d2608aa5f9ff44e9910879f7088f196b874d06ff91d

    SHA512

    d3111e996d245f67935cea484e975650925bf390f4d0c748ff6763ced9d3e8ac93fb1b0e542f66c751e55a4f4cbc2bb632298d6c015efd2f6e7afc4f2f34c39a

  • memory/1952-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1952-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1952-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1952-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1952-23-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB