Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2024, 17:37

General

  • Target

    bd2d77283b6b85762dcd908f6cd21808a021f116bc4333936517a9d935455840N.exe

  • Size

    83KB

  • MD5

    891fb7ad4ae355d311232ab9c55d7950

  • SHA1

    cfa7f9dc2d2f4ff787bae71f9bd26e3248509359

  • SHA256

    bd2d77283b6b85762dcd908f6cd21808a021f116bc4333936517a9d935455840

  • SHA512

    01594404c0af389b22da4800864f8d01636b988afe7a6faca93eb00a170c1ee8f5b4e87d60aef05ec322922e3902b06d4127f7295f294cc7a4289c23c8b2b74a

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+sK:LJ0TAz6Mte4A+aaZx8EnCGVus

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd2d77283b6b85762dcd908f6cd21808a021f116bc4333936517a9d935455840N.exe
    "C:\Users\Admin\AppData\Local\Temp\bd2d77283b6b85762dcd908f6cd21808a021f116bc4333936517a9d935455840N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1628

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-wsIU5d1WDm82HM67.exe

          Filesize

          83KB

          MD5

          2f7e9df9c71e25dad87d1ff77854c7d6

          SHA1

          ed29517635cd433cca47f97154d7cfa18539df99

          SHA256

          1ab72883d1f088c82e687451b1dba3e645e7a148ada50c1df4c90b83b28b6091

          SHA512

          13029a4bacfaaee0e76b5386713d9c620a2f0bed31d58c1e45cdab744582a88cf8a30a63e46d9220acfb3c3a4414bba42ddf5fb42756e9e1c2b2c427eb70c6b3

        • memory/1628-0-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1628-1-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1628-5-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1628-12-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1628-22-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB