Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2024, 04:33

General

  • Target

    3f554d15f407edb9638cc494ad1cd311f4dd1835c6279086dbbee01e1d9392b6N.exe

  • Size

    83KB

  • MD5

    80949f7370ee7d2e7b5c2d11fe2ed480

  • SHA1

    20d13e608444e2a78fc9ca9b8d37b32d2c347338

  • SHA256

    3f554d15f407edb9638cc494ad1cd311f4dd1835c6279086dbbee01e1d9392b6

  • SHA512

    9b0236739cd9a9d0bd99200709d934dcce1335b96f4b4aff5fa96726d0a7e7b695e5523d5f9abc3c405c7d85ff86a5d5f1376aa4d634c7876c381422b835a405

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+CK:LJ0TAz6Mte4A+aaZx8EnCGVuC

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f554d15f407edb9638cc494ad1cd311f4dd1835c6279086dbbee01e1d9392b6N.exe
    "C:\Users\Admin\AppData\Local\Temp\3f554d15f407edb9638cc494ad1cd311f4dd1835c6279086dbbee01e1d9392b6N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2188

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-8lZcPdFhkeZRVIqG.exe

          Filesize

          83KB

          MD5

          c3bf9ef1bbd8c0e8b819ec5c894c954a

          SHA1

          48a3e312a3a2131751c4fb4029367700c7c9c15c

          SHA256

          b55beda4f408d6b37223e5be53b81c500ed9a9f18140552c3c5d370de6123ccb

          SHA512

          804250c1e861a2680b09d4a3d9d7c8b9e5a9c8d9b398637718a1e6faef31c1ce0134d7a1e98b388ca6d56285b401bfc34f1e4f40020d628e98816510c29dc283

        • memory/2188-0-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2188-1-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2188-7-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2188-14-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2188-22-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB