Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2024 16:38

General

  • Target

    4d799599c4e741aaf5cd83b01ec0c6235d7a7fb4849459bfad2e93f0790ced3dN.exe

  • Size

    83KB

  • MD5

    723fbca23bef03d03ade1ed56ec32420

  • SHA1

    35a444c94998bb78db1c2bba4e832632cd7decb9

  • SHA256

    4d799599c4e741aaf5cd83b01ec0c6235d7a7fb4849459bfad2e93f0790ced3d

  • SHA512

    5b9e9a9ba5515832f0d3d750ff86eddfceaf84d044f7a6396b4ff1664d4f47adccf5238f083807719f315ee886e7002db91952c343944d0ca270ce49809959d8

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+rK:LJ0TAz6Mte4A+aaZx8EnCGVur

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d799599c4e741aaf5cd83b01ec0c6235d7a7fb4849459bfad2e93f0790ced3dN.exe
    "C:\Users\Admin\AppData\Local\Temp\4d799599c4e741aaf5cd83b01ec0c6235d7a7fb4849459bfad2e93f0790ced3dN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-V8vhkiZftz5znwUF.exe

    Filesize

    83KB

    MD5

    cb9dfb712f606d17f6b332da3b69eee5

    SHA1

    743af2965951eded75b4c5dfe46d7b140e4e13cf

    SHA256

    d2242c919516eb0a6e43564f9d1956eb20cca6e884dd7628341849a30f177252

    SHA512

    5b1ff424075ba38a22f1cac34c5965a6d30a607b14a16c522118a20f9b6704a774d0b0199db590e91d5f517d71a9d7d1c14fb729b0f58f874237e69518517378

  • memory/1716-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1716-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1716-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1716-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1716-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB