Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2024, 00:14

General

  • Target

    90ee7728024beca301e44e1038fc671ea00269778e6753186d843fbd3fc85a43N.exe

  • Size

    83KB

  • MD5

    3d904c1cb0748d79b359a2d418d1b6e0

  • SHA1

    01dd0b0342c7754d3f9a135f95d9baaaa1fcb96b

  • SHA256

    90ee7728024beca301e44e1038fc671ea00269778e6753186d843fbd3fc85a43

  • SHA512

    b6e29e509f6c839aa2e665c9343ba9d7e4b050d6d2dc1ad331a82d7b233d98d244b9f2ad6b1c37a9febe599e7809127539d440f34f35eba1b98b50e764fac19b

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+MK:LJ0TAz6Mte4A+aaZx8EnCGVuM

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\90ee7728024beca301e44e1038fc671ea00269778e6753186d843fbd3fc85a43N.exe
    "C:\Users\Admin\AppData\Local\Temp\90ee7728024beca301e44e1038fc671ea00269778e6753186d843fbd3fc85a43N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2832

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-BnqGWYg4XpUq2qxG.exe

          Filesize

          83KB

          MD5

          9c8b2cac0122740b0e5294ef146b9027

          SHA1

          632d983909efb26a439a8793e285c8673603bf1e

          SHA256

          c8dffbcaa547b52b95beb96749d221256451104d75fa193784bf54389a724c82

          SHA512

          7058ae4a7758ed1f0196e03bc008c79d7e35514b3658558aa454fbe75f4acfa63da98a0914617e90c45a87c9064a9734a2536d78f0ad62bc57e6e8cebf7aa4a8

        • memory/2832-0-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2832-1-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2832-5-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2832-12-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2832-22-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB