Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2024 02:43

General

  • Target

    e77203b8fcddf38867df6e06bac7b32401fc4abf500f4574f48ba509c27537c5.exe

  • Size

    236KB

  • MD5

    dae7cb9e41bda89e5374de63f828cb87

  • SHA1

    014fc8b559dbdc779a22f87246051a725d3db298

  • SHA256

    e77203b8fcddf38867df6e06bac7b32401fc4abf500f4574f48ba509c27537c5

  • SHA512

    7359c70a86877f88d2074d6d08fa05dc2fd6a0665080dba83db4f5b228c97e35574c483f6ddae00439fa670e15798f075e3ab32d2dbface93beda0f73767c71c

  • SSDEEP

    3072:EJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/c/FnncroP9:IwDeM7iNEkgiOb31k1ECqJ/F

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e77203b8fcddf38867df6e06bac7b32401fc4abf500f4574f48ba509c27537c5.exe
    "C:\Users\Admin\AppData\Local\Temp\e77203b8fcddf38867df6e06bac7b32401fc4abf500f4574f48ba509c27537c5.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-HApfEi3zjrzKAiLz.exe

    Filesize

    236KB

    MD5

    6756f1845bcdc4ff0b68e0065b05a75d

    SHA1

    63761b00d85f652f8a34b3091aef1d0087219f60

    SHA256

    10536b358cd8fd0713d0c716696146f61c01b39ca8bffe0ad19b3b2bd79a25ec

    SHA512

    4181b3aaa733a8e3dc8c8daf1c5a07a889bdc2bbf061a3bcd2a2435c400d698ef69c3f50879c552f1e0c3fdd14dbc963f9ed5fc3b3de690c2f5574f7e37e42c0

  • memory/2712-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/2712-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB