Analysis

  • max time kernel
    110s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2024 15:05

General

  • Target

    d5e6c8f1233175ba5f964f3cc14cb713d9c41ec611b01f0af2ab85ec78bee20fN.exe

  • Size

    83KB

  • MD5

    2b94dac0c107cfc4a3469c4804d99330

  • SHA1

    882523366bd8164d4027e5ea932a034667598655

  • SHA256

    d5e6c8f1233175ba5f964f3cc14cb713d9c41ec611b01f0af2ab85ec78bee20f

  • SHA512

    051b0712e686e730cd27cfa9b2df9f1a2e6559e393655b28658528e2bf5b8974872db9ec2d285abc6b0d31d250560f8a4fefbb9720c537ec46b0314ccb89981b

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+mK:LJ0TAz6Mte4A+aaZx8EnCGVum

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5e6c8f1233175ba5f964f3cc14cb713d9c41ec611b01f0af2ab85ec78bee20fN.exe
    "C:\Users\Admin\AppData\Local\Temp\d5e6c8f1233175ba5f964f3cc14cb713d9c41ec611b01f0af2ab85ec78bee20fN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-Z5odRNLzeMWWQ6a4.exe

    Filesize

    83KB

    MD5

    8c870893fb8dd70354178e721198bede

    SHA1

    bbde2d50da19677f197989aa617778ded77ef2fd

    SHA256

    03d29573130416f9dad746c3f32d0ac131bf1aa5c170afdd2cfef277136a3b5d

    SHA512

    b8945428d60983cce54c970ed21f26bb4b24a982976afb4037e3532b4508e790fbf80fa4dadadb1ec754ca8e07fef8bde4282159c19a2b6eec8d2a14d8711609

  • memory/1780-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1780-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1780-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1780-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1780-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB