Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    02-11-2024 06:11

General

  • Target

    a5e4bd1255d1249693e1f9043bd0547b70383d73b09d7cd298ec85d780b1ee50N.exe

  • Size

    83KB

  • MD5

    9dea1f07f9e02096321bfa49faf1b360

  • SHA1

    6514bfcd2728c8d75a33c412da41971ffbf87d03

  • SHA256

    a5e4bd1255d1249693e1f9043bd0547b70383d73b09d7cd298ec85d780b1ee50

  • SHA512

    e438db8550a83b79841316fd28c0d43d2a71395dfa052a6377b2b02194c5218e49c23efb318bea977d2902de4bcaafc1f75d35a5e2158bd1f77e9715bc034158

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+7K:LJ0TAz6Mte4A+aaZx8EnCGVu7

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5e4bd1255d1249693e1f9043bd0547b70383d73b09d7cd298ec85d780b1ee50N.exe
    "C:\Users\Admin\AppData\Local\Temp\a5e4bd1255d1249693e1f9043bd0547b70383d73b09d7cd298ec85d780b1ee50N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-IqD3R9hcozlLZgeK.exe

    Filesize

    83KB

    MD5

    ddcc9c42ec4f68ec35802a779596bfb7

    SHA1

    97b5be5220268408cf834bcfed3d7dab4b753800

    SHA256

    458a028c7f8fb9ac7bb06a4980d126b86f0431ae752004421c59d4adb7296053

    SHA512

    fe3d8e845adc9e5750d90ef079bbc9f44fa8e241064f12743b324fdd4f7ef7411cffa885c02147fb8e2c79f861f5b85f299b1c9f714963172c3e79b5eb4632bd

  • memory/2500-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2500-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2500-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2500-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2500-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB