Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-10-2024 08:08

General

  • Target

    aa7335627955d66c8e3ee1bd2837cae162618dea3f47b20056442d1fd33bbdbdN.exe

  • Size

    83KB

  • MD5

    f82c90c8a41ec817266893bc6e80f1d0

  • SHA1

    05884fa1eaebc6dd2e7483b5c68d24fcc2c80ea9

  • SHA256

    aa7335627955d66c8e3ee1bd2837cae162618dea3f47b20056442d1fd33bbdbd

  • SHA512

    b7395a6dba9b63895cd8e99156d86fba0c2113594b55b341c173838437e69eb2afcff431304c6b5324ca628b000a2de8a6d2dcdb37ab8919b8a3b4663110e7bc

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF++K:LJ0TAz6Mte4A+aaZx8EnCGVu+

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\aa7335627955d66c8e3ee1bd2837cae162618dea3f47b20056442d1fd33bbdbdN.exe
    "C:\Users\Admin\AppData\Local\Temp\aa7335627955d66c8e3ee1bd2837cae162618dea3f47b20056442d1fd33bbdbdN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2240

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-vQ9LKNBszDIPy2IA.exe

    Filesize

    83KB

    MD5

    d4525a29655cd6ad99dd61bbf4fd2ad5

    SHA1

    dafeedd961b9f7637e488863ba98ccdf90ef9c85

    SHA256

    2e8f2200760ce2e60bdc65d907e9dc39b574b1e86f5756926a9f1cbe8ac76cb1

    SHA512

    60b065b26c68b661b4025cecb92754cf40240529e6f12320232683c2fa181e93876c7307596c6ccdce575cdfed133ac6cdc934e9c3aed5f77633734ed627f406

  • memory/2240-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2240-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2240-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2240-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2240-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB