Analysis

  • max time kernel
    110s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/11/2024, 12:08

General

  • Target

    ced6d2d4384a2540fe7540053457adf7f382d0920bfc4653b77fc283202e5899N.exe

  • Size

    83KB

  • MD5

    f1b35007d7fde0d35af7e88acd4223e0

  • SHA1

    84868326ce32876a985994630fb399a8e4dc2fc4

  • SHA256

    ced6d2d4384a2540fe7540053457adf7f382d0920bfc4653b77fc283202e5899

  • SHA512

    5aeb9b1743897ad39c55157a69d4f7d9211a2828122f15afe9a5e770f36b42244e927f90eda3a1ae608bc944c7738ce1f6ff0ec7a304681e1c6d3e6f6b8b202a

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+yK:LJ0TAz6Mte4A+aaZx8EnCGVuy

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ced6d2d4384a2540fe7540053457adf7f382d0920bfc4653b77fc283202e5899N.exe
    "C:\Users\Admin\AppData\Local\Temp\ced6d2d4384a2540fe7540053457adf7f382d0920bfc4653b77fc283202e5899N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2344

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-BXaK3XZfJL4JA7pE.exe

          Filesize

          83KB

          MD5

          3030517b029830eb7e78c5fff76b57d7

          SHA1

          7f08293de67c0c19e85e01ea0488f53ac9526c88

          SHA256

          b716666af19f67a953758898548a78583306962e83da1e95ba9cf592663ce45c

          SHA512

          f258587bf5a55f96455e0b7263f9354c6858e5dbdc90bd659482002cff3dbdbfd90b389794516a4e223815720c9f330ce98294b5bbbf2c704a6ef5b5ce444092

        • memory/2344-0-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2344-1-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2344-5-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2344-11-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2344-15-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2344-22-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB