Analysis

  • max time kernel
    110s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    04-10-2024 22:02

General

  • Target

    d887a1b5f51dde76faf0e2c2d10747e98e786d35d7fa665edba94765b8d6da0bN.exe

  • Size

    83KB

  • MD5

    d1c4836812b52d7541b500d0d38a2810

  • SHA1

    161639d1c6a01da3371310a16dc6fd6d1d6083af

  • SHA256

    d887a1b5f51dde76faf0e2c2d10747e98e786d35d7fa665edba94765b8d6da0b

  • SHA512

    0743ec54b95b75d149d9610a061034aa02b8c06c731741b26282c19215f136eb6207f79074e840a91b4391d235b383aef030368a1b226f6fcbf30ca2ea82d329

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+EK:LJ0TAz6Mte4A+aaZx8EnCGVuE

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d887a1b5f51dde76faf0e2c2d10747e98e786d35d7fa665edba94765b8d6da0bN.exe
    "C:\Users\Admin\AppData\Local\Temp\d887a1b5f51dde76faf0e2c2d10747e98e786d35d7fa665edba94765b8d6da0bN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-Sir0kW6jyqb0JR6F.exe

    Filesize

    83KB

    MD5

    27a674e0b62839895cc512b9be2a947f

    SHA1

    df7c10275b1758fa94acbaa6f6c8d5c2c6566775

    SHA256

    ea60b732651e3183a0fb8e324b54708428f8148d37b721f115758000897b17c5

    SHA512

    057d5a6e40de27aade279b9b2a1f60f99c9eb852eaa42d35e31186610979d78f59e5b147427fe1c0671f52a9d190adb6f15e0c8b198f740af169e68558876dbc

  • memory/2356-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2356-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2356-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2356-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2356-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB