Analysis

  • max time kernel
    110s
  • max time network
    94s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2024, 15:42

General

  • Target

    2717dbc0ab97820ccc86eb816725783c1cc33abe9f20a8116abf219769f7ad5bN.exe

  • Size

    83KB

  • MD5

    2a0008780c7f832ff8ffdbca70f08780

  • SHA1

    03e098c11125fea7eae47a4036ebadc689fffd57

  • SHA256

    2717dbc0ab97820ccc86eb816725783c1cc33abe9f20a8116abf219769f7ad5b

  • SHA512

    7d9a01b395426b63573b9390ba22546396487e86581ef84bdcb0e269651b79e41550d01d002bda54e379ff3a76471d503faa53979bea837dac5789ddc2edc673

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+rK:LJ0TAz6Mte4A+aaZx8EnCGVur

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2717dbc0ab97820ccc86eb816725783c1cc33abe9f20a8116abf219769f7ad5bN.exe
    "C:\Users\Admin\AppData\Local\Temp\2717dbc0ab97820ccc86eb816725783c1cc33abe9f20a8116abf219769f7ad5bN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2996

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-idfqWsJIERCP4Qco.exe

          Filesize

          83KB

          MD5

          90b6a62ebf741230e45f6601f1e6d27e

          SHA1

          fc878920240130af71bef3c6e16c2141c3edf165

          SHA256

          c60af0dc9656e1293f43bd75cf146d446d91fd687a031eb1b08cb7312727a86f

          SHA512

          d6aad8a5a3e515790cc18e135bfdd9d4835769335a1939bc99a3f4557fdbd43475fafd4a3de6e6d7eda1516084e44b4ff39f9a4d18b397bb58d3514458f0aab9

        • memory/2996-0-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2996-2-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2996-6-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2996-13-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2996-23-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB