Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2024 07:06

General

  • Target

    47dceb31db459b1bec60e79542af29d3d587b81e8901e42e2cc91ddd9d2a40e6N.exe

  • Size

    236KB

  • MD5

    bbebf55964c6a9dc0f63395c40561570

  • SHA1

    97443f376f97df9c0e44543fe4b4dbb6dfc04c86

  • SHA256

    47dceb31db459b1bec60e79542af29d3d587b81e8901e42e2cc91ddd9d2a40e6

  • SHA512

    c420d30f351e61c7e9d855e478de77c22443e624e8cdc4dfce060f172e07f25e83c770b29c377ae3fe8692475ebcc6f5464ddf4902e12be22666f4c16ecb4943

  • SSDEEP

    3072:8J0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/L/FnncroP9:AwDeM7iNEkgiOb31k1ECLJ/F

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\47dceb31db459b1bec60e79542af29d3d587b81e8901e42e2cc91ddd9d2a40e6N.exe
    "C:\Users\Admin\AppData\Local\Temp\47dceb31db459b1bec60e79542af29d3d587b81e8901e42e2cc91ddd9d2a40e6N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-mpKa4u172EHiaKfw.exe

    Filesize

    236KB

    MD5

    7abdc23878792db7d9174b1dacf9c234

    SHA1

    189fc9850f7e8bf1cf8665da9b6a4c35671f1254

    SHA256

    4e33c424e8f8da024ee73a0c3ffdedf131584e071d82095b1721beec31e6d0b1

    SHA512

    cb0cda7a5d59ecef98559194fe8e40a8f956ef7298f6859ec08328513211b51b0b04d5195dface43b8eff167a84cd5bf01fbcbf34c15ea350c6600f54b8d83de

  • memory/2884-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/2884-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB