Analysis

  • max time kernel
    110s
  • max time network
    91s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2024, 19:10

General

  • Target

    0bd7617dd11aa8518fd2dd51d70342579f3639a090a9d1d1f3552712ceb326a7N.exe

  • Size

    83KB

  • MD5

    05fb84cf0a59f675269784c1c21d3260

  • SHA1

    968ff94f301357765e0cb20b537403c0bfce3b33

  • SHA256

    0bd7617dd11aa8518fd2dd51d70342579f3639a090a9d1d1f3552712ceb326a7

  • SHA512

    0bd67cfadfe9a1f279b504a1de6b3226cd71827eb5fb2692b07a65be91d33e36ac8308eed3c08ceaa15f12d021ee1cc380040d2a3ab6a51357d67003c59f6c17

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF++K:LJ0TAz6Mte4A+aaZx8EnCGVu+

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0bd7617dd11aa8518fd2dd51d70342579f3639a090a9d1d1f3552712ceb326a7N.exe
    "C:\Users\Admin\AppData\Local\Temp\0bd7617dd11aa8518fd2dd51d70342579f3639a090a9d1d1f3552712ceb326a7N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-USIB4o7kYNVDlyd5.exe

    Filesize

    83KB

    MD5

    49fc2897fa917c6f23a88ff908e10743

    SHA1

    b8e1ca964621523c3172c2ec9e0005f740403e6d

    SHA256

    b2ac6bc4385ead8f10a6c8f6f15e9a75e6a8d4716ab8fe2d745a7c298b1dde68

    SHA512

    93731a009c9df39f96b61948bf3127dccc206132c6bcb85d66774147c19e91b2e92398789d0db707767cab210272fcd82e74a3e58adcf07d810760d9f192dfac

  • memory/2288-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2288-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2288-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2288-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2288-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB