Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-10-2024 07:28

General

  • Target

    9d1c9f9b6c6b2a2e2271901f8c9c4afe4eb29379e463877d8d017c0c1682f22aN.exe

  • Size

    83KB

  • MD5

    429af72398f250569ff9997fa3bd0820

  • SHA1

    4b04286e62616130bffb5a3d924f12918222d90a

  • SHA256

    9d1c9f9b6c6b2a2e2271901f8c9c4afe4eb29379e463877d8d017c0c1682f22a

  • SHA512

    cc074c8dc19d7fe071f3ad9e46a812acb76249560da391bcb5d35fd55caf5990e74d8255e560b8090ef9e45f2c4f18de10c7a308b0544771bc2e2cc3d6833c03

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+cK:LJ0TAz6Mte4A+aaZx8EnCGVuc

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d1c9f9b6c6b2a2e2271901f8c9c4afe4eb29379e463877d8d017c0c1682f22aN.exe
    "C:\Users\Admin\AppData\Local\Temp\9d1c9f9b6c6b2a2e2271901f8c9c4afe4eb29379e463877d8d017c0c1682f22aN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-0yTcefu8nakvPX2J.exe

    Filesize

    83KB

    MD5

    cb510c377c1a2a57e59365dcd9b1f18a

    SHA1

    02f2c4208918c4a518eb9eeb1729defd4f75eee6

    SHA256

    3b173ed3e200ce50f02daf76f1b6ade94449b8dc533be59921f924c17483d175

    SHA512

    436df7d87bbb4c4cbf81503f18efce30905cd5295c6f4d6e17a0602baef0e137e58fe433dfef35f696632d8e6d4c88e46d6b8628877d176abd47ed744e3bed7a

  • memory/2808-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2808-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2808-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2808-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2808-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB