Analysis

  • max time kernel
    110s
  • max time network
    100s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2024, 15:27

General

  • Target

    3aa0d1bab7f1b677d7973f345063327a7b0d54a59aea46ab1b8de0fac950ebabN.exe

  • Size

    83KB

  • MD5

    4f13873bc75bfbf92791f6dcec989ce0

  • SHA1

    4de23307070c9987b0bec476d7647aa5f0349f70

  • SHA256

    3aa0d1bab7f1b677d7973f345063327a7b0d54a59aea46ab1b8de0fac950ebab

  • SHA512

    87a12aba3716f220f42b5536b8d22b431e86263ffdb10834c61b61272065877781824aba04f5f08900e02318db50cc5ed26af0db4842ee6e337fd9c30540e0a0

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+nK:LJ0TAz6Mte4A+aaZx8EnCGVun

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3aa0d1bab7f1b677d7973f345063327a7b0d54a59aea46ab1b8de0fac950ebabN.exe
    "C:\Users\Admin\AppData\Local\Temp\3aa0d1bab7f1b677d7973f345063327a7b0d54a59aea46ab1b8de0fac950ebabN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2652

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-t0loJ1MXXjQmnjSo.exe

          Filesize

          83KB

          MD5

          ebacba1f808b568393143408332bbc31

          SHA1

          6f2367406e6c7b2023ba999f3fa82a1ea13f2d0c

          SHA256

          64417273ffae7d8e89bd5b951bd7ce9edafbcf6fc3d87bef4f0302fd1d09c9ad

          SHA512

          28f54e87d0323f95f38aec1efbbe9b2b4c418ef666c45111c6c2057a22a7cf67ba3354488875655ed054a7bd22ce96863fcfd24b137e2d509fde42c059f2c3f1

        • memory/2652-0-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2652-1-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2652-5-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2652-15-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2652-22-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB