Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2024, 11:04

General

  • Target

    ec54d968c1b1d2ae8071204bc147fb1ace65fa37ffe0eaa4e3be1abe00aa50d8N.exe

  • Size

    236KB

  • MD5

    9474e5a6971d2740d7385382b76c1950

  • SHA1

    4a075d99fa92dcd62ed795db8e2f69d65164ad5e

  • SHA256

    ec54d968c1b1d2ae8071204bc147fb1ace65fa37ffe0eaa4e3be1abe00aa50d8

  • SHA512

    618579be6b57bf333be446554de07e1cb83aa27a9a484f11864727b87042e356129ae718dd86ee57a506e796cc75ab2d4814c035ba11172acd63fd685093ca6c

  • SSDEEP

    3072:nJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/v/FnncroP9:JwDeM7iNEkgiOb31k1ECvJ/F

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec54d968c1b1d2ae8071204bc147fb1ace65fa37ffe0eaa4e3be1abe00aa50d8N.exe
    "C:\Users\Admin\AppData\Local\Temp\ec54d968c1b1d2ae8071204bc147fb1ace65fa37ffe0eaa4e3be1abe00aa50d8N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2884

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-HAgvFvbzhcZR1oU3.exe

          Filesize

          236KB

          MD5

          28825fb843d485fc91d58bb4fd00a956

          SHA1

          fdbb8fdd2392fcf9f4f2eb4d3b752161dffc672a

          SHA256

          47a4a078738476fc5cb8cae2f51ba279edd6c5c04a65ce2822115ef6768681e7

          SHA512

          ac2802e767f4b3d416c8c5f404c0d45b42d6e51c0e4ee81deec6fe888d3620f5541dff15e30bfcb51935b2e958911a05ffa100060a50c02a5a15ea6b032947d1

        • memory/2884-0-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB

        • memory/2884-1-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB