Analysis

  • max time kernel
    110s
  • max time network
    98s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2024, 10:03

General

  • Target

    d3fa1947b70fca5b8233451639721bbf11b6f97ee6ffcdbe66d43cb65e9da93aN.exe

  • Size

    83KB

  • MD5

    2c80b7b5487d104ccb36eae09e343810

  • SHA1

    71d43729d2455804c1b25e0974dccf3bacb6396d

  • SHA256

    d3fa1947b70fca5b8233451639721bbf11b6f97ee6ffcdbe66d43cb65e9da93a

  • SHA512

    1c097d2183931177aa7d7e5827c372f38b2f41b934589320f6de9f1d25bb60487fd9cbf1eabab307c0648f9eec3834d2384d17bb90a1024b7b41067e91fd344a

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+bK:LJ0TAz6Mte4A+aaZx8EnCGVub

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d3fa1947b70fca5b8233451639721bbf11b6f97ee6ffcdbe66d43cb65e9da93aN.exe
    "C:\Users\Admin\AppData\Local\Temp\d3fa1947b70fca5b8233451639721bbf11b6f97ee6ffcdbe66d43cb65e9da93aN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-zie8SgGtcmFd3PGO.exe

    Filesize

    83KB

    MD5

    49d7424aef6c2036103d010604da41ac

    SHA1

    aaaf810b8677e3bbc16e29077c8db9337f3ce5e9

    SHA256

    01347b126990b5572ab1880ca8d871af3a3f3a7ba10c48c9ac0f6afc5f2de0b7

    SHA512

    73609aab363392ec74e0617e2cc0b9b41e7af2d1a4a66d65e95188830b1c9bbd64549e254ca07716a8a6d7464223ffef2dfbb44e4bcc730481aba57b57ab3b91

  • memory/1636-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1636-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1636-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1636-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1636-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB