Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09-10-2024 20:25

General

  • Target

    4205f585538470b3ee2858194dd826f0aa8c263a15e2c386d807739748457b4d.exe

  • Size

    236KB

  • MD5

    ed3dc58d3ba5736dfd167865363774ee

  • SHA1

    e3e562ac9b6df8b578ddff9793c8d1d46e9c06ed

  • SHA256

    4205f585538470b3ee2858194dd826f0aa8c263a15e2c386d807739748457b4d

  • SHA512

    bdc724ba076ddd3afe6c069b423f03481c97e93892303f0294279a93c4af1194799e6a0024640f067eee98f669698eeea7d3bd726e2ed6ef28de26e4ac4bf50c

  • SSDEEP

    3072:xJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/m/FnncroP9:7wDeM7iNEkgiOb31k1ECYJ/F

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4205f585538470b3ee2858194dd826f0aa8c263a15e2c386d807739748457b4d.exe
    "C:\Users\Admin\AppData\Local\Temp\4205f585538470b3ee2858194dd826f0aa8c263a15e2c386d807739748457b4d.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-yF7dGBItFVbxeoZ7.exe

    Filesize

    236KB

    MD5

    4115aaa7cd042e480b69c04fbcb96dc8

    SHA1

    a59d958bfabe2aae5bdfbec2811630475db5025f

    SHA256

    e0b081f6ce91ade65060bf0d62b879f4b1b4719b20bae59f079a3cec16ef107b

    SHA512

    8db43d1d90b6d4f52a34c5c03a66fcc301a0a5b83e3682e41f0d453c2a0e2fa1e57093d46812f011ca67779b927dcee819c278396a9c195ac613e294565be22d

  • memory/2644-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/2644-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB