Analysis

  • max time kernel
    110s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2024, 11:04

General

  • Target

    6368d00b5e9074560de565171c0aa09c31f3761c3c18b93ad5f89d219414ae86N.exe

  • Size

    83KB

  • MD5

    4074e5d3fc1a5f9c6147162fa8794f70

  • SHA1

    70e7993df58b8614e45c0969ec082731785ec6bb

  • SHA256

    6368d00b5e9074560de565171c0aa09c31f3761c3c18b93ad5f89d219414ae86

  • SHA512

    4b582203e58b9ba9c8d702629485d8e2f2185aabe65837fda31031e879011e28a29f0a78527a9378d92be40e5eab22f9e536ff8eef034e7954c905709c7ed14c

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+0K:LJ0TAz6Mte4A+aaZx8EnCGVu0

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6368d00b5e9074560de565171c0aa09c31f3761c3c18b93ad5f89d219414ae86N.exe
    "C:\Users\Admin\AppData\Local\Temp\6368d00b5e9074560de565171c0aa09c31f3761c3c18b93ad5f89d219414ae86N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1632

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-SqZRZUrv39iJ9mTT.exe

          Filesize

          83KB

          MD5

          82507901df72ac826df8f503d5af1aae

          SHA1

          e47cc3a27b4161cbf62044cb71290bf22f04002f

          SHA256

          4a74da41e940605128be1f8dfdc3c6ac9685a7f3301d93503e8794768680d2e6

          SHA512

          44ae08dde0c30a74cc06d8246168e63549c2faf2ce6c6d9d0b5d5bce91ddf1253492f98d4a22a90b09c0a4a3376512d16d86ef7e4dcdba29a5d85e3b1b346347

        • memory/1632-0-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1632-1-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1632-5-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1632-12-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1632-22-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB