Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    09/11/2024, 16:40

General

  • Target

    ccf85039db1feccd2982306dc3d214e49fda1e42e8f135ce47c33565e81c2432N.exe

  • Size

    83KB

  • MD5

    b3fd67953c6f4aa5d2e8f6c2ea00f430

  • SHA1

    93602cbfceaa0d27fca73b8a16f0412b6dbd440a

  • SHA256

    ccf85039db1feccd2982306dc3d214e49fda1e42e8f135ce47c33565e81c2432

  • SHA512

    fd3c9403677ceaa1db41ce6d85afb5a6b128803878d19ec086adead37ed6892e9b9802de4997e02073119210e54090a24ca9725627756593937b33f07ea3ae94

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+eK:LJ0TAz6Mte4A+aaZx8EnCGVue

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ccf85039db1feccd2982306dc3d214e49fda1e42e8f135ce47c33565e81c2432N.exe
    "C:\Users\Admin\AppData\Local\Temp\ccf85039db1feccd2982306dc3d214e49fda1e42e8f135ce47c33565e81c2432N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-Bee0GBmm2RmiGuG8.exe

    Filesize

    83KB

    MD5

    78be74af2f840e46270009f3cadd39d8

    SHA1

    4e0285ce954b7bd29429fb15ac9d9321ec1b3741

    SHA256

    f5d32c81784f3de69fbd0f8504c90a5277e87910da0b4c5c90b30795eb8e29ae

    SHA512

    5374c378e9a9ed78a5fcb48352bf2bec96e22df0c943bb473c4a39c0c948a8e8edbc4ceb427511e57ee3c749526dfe1a8138436bbc12bea813d351fcef591050

  • memory/2884-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2884-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2884-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2884-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2884-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB