Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    17/10/2024, 16:04

General

  • Target

    f580affd2e2025f25e78876814b94351454b3a5ec2ed4c72f71d41ab43eecd0dN.exe

  • Size

    83KB

  • MD5

    c952deffc67c2d0d6edf6ee1afea7d50

  • SHA1

    624ae0d64cadcb641f47d6c7d89baeb469f96e9f

  • SHA256

    f580affd2e2025f25e78876814b94351454b3a5ec2ed4c72f71d41ab43eecd0d

  • SHA512

    42b76cc3ea296ba3d575de53f60dde860ba323c093aca59685221f119e161caa749c2309962d122a40d6213506f6726826b13bcfbcfdd487996db8407dd96410

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+IK:LJ0TAz6Mte4A+aaZx8EnCGVuI

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f580affd2e2025f25e78876814b94351454b3a5ec2ed4c72f71d41ab43eecd0dN.exe
    "C:\Users\Admin\AppData\Local\Temp\f580affd2e2025f25e78876814b94351454b3a5ec2ed4c72f71d41ab43eecd0dN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1760

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-nFfRHcRsIhVNsOA4.exe

          Filesize

          83KB

          MD5

          f929cbf26fba82a0ff52ac2e6abcffa2

          SHA1

          08bd396b9ebf27c6237a4d48e12c4d29f8c94866

          SHA256

          6d52fa0a90b95081fb3af73074c9301448ecb358aa4150e763fd56d7645464b1

          SHA512

          8151981e74293c721eea29a1a9bd14947b8e7dd9c70baa00b97a4dd4ef02b75d7516d9871ebaca6976ad00919befc4fa7cc431aa55bdf584baa442daa8b9c19d

        • memory/1760-0-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1760-1-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1760-7-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1760-11-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1760-13-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB