Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2024 00:11

General

  • Target

    ad040e4c589fc26bda141628d48dbfd7cf7aed17223ca9e2b2b6f6efa8623d66N.exe

  • Size

    83KB

  • MD5

    1653b0f58251200b9b2b9d1836c90150

  • SHA1

    03d9831813b66aeabc6c37e4d31e4e89b5e1e352

  • SHA256

    ad040e4c589fc26bda141628d48dbfd7cf7aed17223ca9e2b2b6f6efa8623d66

  • SHA512

    0b6aadc93cab4394b07e2a11adcbb1924c70deb27067ac79494a0284a31051c55a39a160257cd4f8896e116e17818a1d9c8925ae9defbfe99dd04273df25b967

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+4K:LJ0TAz6Mte4A+aaZx8EnCGVu4

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad040e4c589fc26bda141628d48dbfd7cf7aed17223ca9e2b2b6f6efa8623d66N.exe
    "C:\Users\Admin\AppData\Local\Temp\ad040e4c589fc26bda141628d48dbfd7cf7aed17223ca9e2b2b6f6efa8623d66N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-tHOsAxCaof5sr958.exe

    Filesize

    83KB

    MD5

    16f80b2f56f6ecf86dd62ee0cfc96430

    SHA1

    743495b81f5a93a742b946dc396a824dad131ae4

    SHA256

    f7996ef6e29e98a8931ff28a7730c7d574179a8b1389ee81651f6df0418a8280

    SHA512

    b2447c81c70fd8fc2487f99a2d408cd7c9a1f233ffc8ceb2289c648c93df79dbbdc55dabbd9dc2362b3b2503a47afdb67138a6bfae4747f585378207639a2288

  • memory/1968-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1968-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1968-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1968-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1968-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB