Analysis

  • max time kernel
    92s
  • max time network
    93s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    06/10/2024, 04:27

General

  • Target

    1d3c9760da24e2d0de4db0e4f919f010e84316130615085f0e140ac87033870dN.exe

  • Size

    236KB

  • MD5

    31d8ae4630c67bdc44dd67473e5d6da0

  • SHA1

    5a8cb4e3900beb1a57d844ed231ce8a91c33bf28

  • SHA256

    1d3c9760da24e2d0de4db0e4f919f010e84316130615085f0e140ac87033870d

  • SHA512

    8826d5f6b278d9e075b4119bc2eb02e8c01068e4153813dbaa192ca173c442a8475b8a0ecf31ed0b56aa4e72bce07faf119a1e491dda91c3fb61d2fc4b8e92e3

  • SSDEEP

    3072:QJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/f/FnncroP9:0wDeM7iNEkgiOb31k1EC/J/F

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d3c9760da24e2d0de4db0e4f919f010e84316130615085f0e140ac87033870dN.exe
    "C:\Users\Admin\AppData\Local\Temp\1d3c9760da24e2d0de4db0e4f919f010e84316130615085f0e140ac87033870dN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2248

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-NwXp0DqrlrZtpZm9.exe

          Filesize

          236KB

          MD5

          c4bb92f1238e3db0d2584907f7fbba43

          SHA1

          06764565f5578476b4a5a769514d3b060dd229ef

          SHA256

          e4338ab2bd27c30fa897fbf9fc9e04d14b95658ee97c81983e8892274e82e29f

          SHA512

          9cd61caeb6a5ebb2accf32769ba0e44f6d0641f81b84d407479ab72b1f2d0af9f7fb1b71ebaa282b23ace9ff05efb3974fa9c0f12ec9855705fc34cc37160edf

        • memory/2248-0-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB

        • memory/2248-1-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB