Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/11/2024, 11:15

General

  • Target

    cc75d34d12102befdcae5d16cb10f435fe8724b48e697044f5ac929425e04944N.exe

  • Size

    83KB

  • MD5

    18ea1de9ce2b3aacd048b51ea79eaa40

  • SHA1

    b14b9a6f007a3b77f6f2f067bdee0589c66be46c

  • SHA256

    cc75d34d12102befdcae5d16cb10f435fe8724b48e697044f5ac929425e04944

  • SHA512

    c205b7afdf66ea6f29731dd1f2c91ce224a86ad84e578f69a1ed572ef1910b41255fb8c7982ea3e1cc0378fc0a251682c2e4100bfe138a19ba511211dd5a05e8

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+/3K:LJ0TAz6Mte4A+aaZx8EnCGVu/

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc75d34d12102befdcae5d16cb10f435fe8724b48e697044f5ac929425e04944N.exe
    "C:\Users\Admin\AppData\Local\Temp\cc75d34d12102befdcae5d16cb10f435fe8724b48e697044f5ac929425e04944N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2268

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-lFTHqgOuKVGqAZ9e.exe

          Filesize

          83KB

          MD5

          0971fc140052b330e977df31ff3ef3f8

          SHA1

          be9a553bc85427f1566fc830b05fab42b528a17d

          SHA256

          7156b3882986e9f90881627fd4f79f98f61f266559668f9b7e5ab2df09d3504c

          SHA512

          90a151d53f1c203c8cba6a293e7e20458566e4fe7ea5bd269e851811c2f9b2535c715bc4a935cb2de31ffbbac49ba77653b81595994e08182371f25b6c9aed23

        • memory/2268-0-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2268-1-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2268-7-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2268-14-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2268-22-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB