Analysis

  • max time kernel
    120s
  • max time network
    100s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2024, 05:21

General

  • Target

    7f03185542fa75c9497053a02957aacb9bd239661b9add9a66cf2c9bae84292cN.exe

  • Size

    83KB

  • MD5

    271deb93a3ba3790c0ec7c3270cb9910

  • SHA1

    6f1c5075d2f7168fd11226dddcaa64583f2cac03

  • SHA256

    7f03185542fa75c9497053a02957aacb9bd239661b9add9a66cf2c9bae84292c

  • SHA512

    bac9e15b28018530db894852c66928898fa0ddb1093baab37e94e43a2b1514f45e9d8da24ee31df55d69474f538ae0e976fdf20602ff21b8435cac48648f9eae

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+PK:LJ0TAz6Mte4A+aaZx8EnCGVuP

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f03185542fa75c9497053a02957aacb9bd239661b9add9a66cf2c9bae84292cN.exe
    "C:\Users\Admin\AppData\Local\Temp\7f03185542fa75c9497053a02957aacb9bd239661b9add9a66cf2c9bae84292cN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-lFRdscFpWBZBvaqw.exe

    Filesize

    83KB

    MD5

    ab09316f90e8950aae4da45ebbb65336

    SHA1

    a04ed6e79289a1d3d745716a5990522591b958e8

    SHA256

    5d0511ed7c43151ce62f901944f6584729dd812c8ee163903608d7b2eb4af3f3

    SHA512

    16dbeebd5e80712a252270f85b34803cf8ce61e1f2c830096a92cf493671f3bdbc428638f1fa14088f71149ff66a577b2765f5a6cf1717c7fc840fe20bf10603

  • memory/2712-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2712-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2712-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2712-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2712-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB