Analysis

  • max time kernel
    111s
  • max time network
    96s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    09/11/2024, 13:41

General

  • Target

    1350bbf294212afdd1295eb50aa1c723041e48509079c8b01ccb3b5d51225af1N.exe

  • Size

    83KB

  • MD5

    976433f07aa866c10c1510712352c210

  • SHA1

    1d221e7d720542f1e98d2da50696ee637ae41734

  • SHA256

    1350bbf294212afdd1295eb50aa1c723041e48509079c8b01ccb3b5d51225af1

  • SHA512

    31c1e9ac559f20df2649f1b6e951dd7638de767200a5a1c1f945cc3a1291f72697ef2e11228d5d5510b9b3ee59052fbece7f41089db9fe0c584236bd539a0df9

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+eK:LJ0TAz6Mte4A+aaZx8EnCGVue

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1350bbf294212afdd1295eb50aa1c723041e48509079c8b01ccb3b5d51225af1N.exe
    "C:\Users\Admin\AppData\Local\Temp\1350bbf294212afdd1295eb50aa1c723041e48509079c8b01ccb3b5d51225af1N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:564

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-Ha15qfTio71h7DCL.exe

          Filesize

          83KB

          MD5

          7109bb767188b31cad5dd0f0d1ce3553

          SHA1

          3230582caf38db764d0e93e63eb42deb638bc33c

          SHA256

          40cbea8a9bfd47c33314e851e5dbf86ff38ef7bbc14d9bbe9c09f0aac4053a40

          SHA512

          0182d31645fca20b17eb00e2a0a78f757083fccc29b0dad19eb8803dbb169475d263caba9cd42ac54545d61546e316bc5a8cc5fb6f3d1e858772aa0470ceff29

        • memory/564-0-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/564-1-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/564-5-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/564-11-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/564-22-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB