Analysis

  • max time kernel
    111s
  • max time network
    98s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-10-2024 02:31

General

  • Target

    d630868356454050c3a315d7e5b4e546bc1f49ae4cc8ebee0d1af53b1934372bN.exe

  • Size

    83KB

  • MD5

    169586b75c0e1df8e1c1740b2574c3e0

  • SHA1

    29d1010ac94b191c5172bf9c99695a90646678db

  • SHA256

    d630868356454050c3a315d7e5b4e546bc1f49ae4cc8ebee0d1af53b1934372b

  • SHA512

    399ef131751797f94957423b71dbc3c014e43f4d8bdc852dcb1ed7c9e44c86f9aad4da362df3d776970aafddc8d0073c5b6c74b5ebc53098925f8f07582379a6

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+DK:LJ0TAz6Mte4A+aaZx8EnCGVuD

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d630868356454050c3a315d7e5b4e546bc1f49ae4cc8ebee0d1af53b1934372bN.exe
    "C:\Users\Admin\AppData\Local\Temp\d630868356454050c3a315d7e5b4e546bc1f49ae4cc8ebee0d1af53b1934372bN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-pP52fALP0b9HsRPu.exe

    Filesize

    83KB

    MD5

    c2da599f26da785168c70fd7b5037a95

    SHA1

    ae26474713dcadcd46b0678da25c472696169760

    SHA256

    97d449429e81441a80eee605ed026dfefd786f98ad68c55947234e434c6f5183

    SHA512

    db69537fa238712b6af987491f05754c9c84b3699d9868d72f75cae09f313a02a4500e4f825666f6473aa7f715d50b47f6c61c3e72200b5e8bff5fd69466479e

  • memory/2876-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2876-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2876-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2876-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2876-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB