Analysis

  • max time kernel
    110s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2024, 11:02

General

  • Target

    41baa20e82d89b8c97fc534f0d017dd5813167b6316db2fe860413a75c6f4181N.exe

  • Size

    83KB

  • MD5

    a31ab24650f1cb7302bc3085dd47d510

  • SHA1

    cf4e3aa887f9c3cf1a6729eec043e8ec7243dd6f

  • SHA256

    41baa20e82d89b8c97fc534f0d017dd5813167b6316db2fe860413a75c6f4181

  • SHA512

    b263ced8a1cca2c7dceb7e2eee7a10b286c1dc914cb90060477912ed5a157fbb4447c1df7ad519e16a9122563314cd022721cfdf2aca3a7f742ff17b36078f35

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+VK:LJ0TAz6Mte4A+aaZx8EnCGVuV

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\41baa20e82d89b8c97fc534f0d017dd5813167b6316db2fe860413a75c6f4181N.exe
    "C:\Users\Admin\AppData\Local\Temp\41baa20e82d89b8c97fc534f0d017dd5813167b6316db2fe860413a75c6f4181N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3032

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-q3sDNHq40fQmjn2T.exe

          Filesize

          83KB

          MD5

          d7c4e2ad7a92ef611f6d895fa29d7a8b

          SHA1

          6626be52e00f298d776a7fa163de8ddeac8d9a7d

          SHA256

          42fc65c968d5efae1d932df9eaf0d9afcd2525b4b4cc883f46411803a41635ec

          SHA512

          e1060dad923fd6309d0568605a89245b4a4f4feda407765a2f24b66244b1700612ef5d1007e1cb38f25f3aa782d4d4ba90d80b57ab6107e7ccf177f3475f9551

        • memory/3032-0-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/3032-2-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/3032-6-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/3032-13-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/3032-23-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB