Analysis

  • max time kernel
    110s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18/10/2024, 06:24

General

  • Target

    c1190dca7248b6290e6b71bb59424480c30622b86ce64157e700873e5b5940d4N.exe

  • Size

    83KB

  • MD5

    a38b6fa4980db7d7fa5ae2ec0865e6c0

  • SHA1

    8dc86fdc06a15faf079d251f42b4f67e9519d9d3

  • SHA256

    c1190dca7248b6290e6b71bb59424480c30622b86ce64157e700873e5b5940d4

  • SHA512

    eac4f27f5a548cd78fe38f2dc240d1a694ae073cea212cc4802b62d3764a54fd9dbd1edaacbbfd3255b50c42d987ce1c2c7e0e88434b8ab50089445546a1ba98

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+cK:LJ0TAz6Mte4A+aaZx8EnCGVuc

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1190dca7248b6290e6b71bb59424480c30622b86ce64157e700873e5b5940d4N.exe
    "C:\Users\Admin\AppData\Local\Temp\c1190dca7248b6290e6b71bb59424480c30622b86ce64157e700873e5b5940d4N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1080

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-bi8DRrvCvoLZ1ZKU.exe

          Filesize

          83KB

          MD5

          339320446126de10cee473ae10195b1d

          SHA1

          e1506e361ed28d96a3857a32c2a313d8c6705b21

          SHA256

          e45294a01dc07cec62385fd405c55251d09c7250093905091c31e61eb2d27d64

          SHA512

          d3227f0ff63c3da32bfd4126e88971d88415361d308e13140fb4a757634f7d2854ed024cf8ca434e7a433ec78dc5d2e3198c8f63678f49dcf62553eed12f4cd8

        • memory/1080-0-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1080-1-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1080-5-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1080-12-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1080-22-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB