Analysis

  • max time kernel
    111s
  • max time network
    114s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-10-2024 07:57

General

  • Target

    b6da5e69589236913acc9198d5965a053097c8600ea94dc9cdfd70236c6d146bN.exe

  • Size

    83KB

  • MD5

    10b4722151888b0e8601b3e7538d24b0

  • SHA1

    d346ee6aa35bfd9afb43c94219a1fcff61249cdc

  • SHA256

    b6da5e69589236913acc9198d5965a053097c8600ea94dc9cdfd70236c6d146b

  • SHA512

    f97a8817cf125d317fdb9109c376473f5213c80783c2a4cb83816c589f3c58fcbcadcb57aa67d473982792f9ac3710628b2605b330fc8daecea4135d2c74b78e

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+/K:LJ0TAz6Mte4A+aaZx8EnCGVu/

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b6da5e69589236913acc9198d5965a053097c8600ea94dc9cdfd70236c6d146bN.exe
    "C:\Users\Admin\AppData\Local\Temp\b6da5e69589236913acc9198d5965a053097c8600ea94dc9cdfd70236c6d146bN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2444

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-SikXbfB8VRGJE9r6.exe

    Filesize

    83KB

    MD5

    c0f1fb195483a4ca211d696de43bbd60

    SHA1

    9b94b0f22d6f11d083bf849aaf41dfc7f089ca11

    SHA256

    464912752335b83512b41ec78aad0d9e547c668e5a8a49a61573125c8ec71941

    SHA512

    7429b726e3a1dd652ab3c0768dd556ad58b327fc25b25b7e3df9829f1b8667070fadf047791765ddb96e3c560746a8d46f52b3b8ab62adb1bf07c7d1693cffde

  • memory/2444-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2444-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2444-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2444-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2444-21-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB