Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    09/11/2024, 18:18

General

  • Target

    b00481bbae74360b61f270601e31a63cef0b7e4f57870030790bd4ae11b6484aN.exe

  • Size

    236KB

  • MD5

    923f45524da191b76eb6c04d9acb9e70

  • SHA1

    e410589b924743737f10d618a21754f2f65661fa

  • SHA256

    b00481bbae74360b61f270601e31a63cef0b7e4f57870030790bd4ae11b6484a

  • SHA512

    684d37dc4ef41e4ab85601d2b61657ec1cca72c4ac7166ab2944f594b4a83b29bc44bfe1a348c6e0fafe54ea3edbef33ec063f2fe1c9154ec67d01d731da61a8

  • SSDEEP

    3072:vJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/1/FnncroP9:RwDeM7iNEkgiOb31k1ECRJ/F

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b00481bbae74360b61f270601e31a63cef0b7e4f57870030790bd4ae11b6484aN.exe
    "C:\Users\Admin\AppData\Local\Temp\b00481bbae74360b61f270601e31a63cef0b7e4f57870030790bd4ae11b6484aN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-gv6kBlKv2s5Da5iq.exe

    Filesize

    236KB

    MD5

    395c353c5338a33dd80450fc7e055a53

    SHA1

    c7e37e85a15bf46861c74f96145d90c01c646e20

    SHA256

    c9590cf02167b949e209d0604a36c9a9d2fd940bf1f464b43e710c9cf6a78d2c

    SHA512

    a24a5bd8271d9107db25fd0debb024715d6d6a631568286cb4b1e78689b38c6b2bfd759f3a4f62a77008cd641cf4fe653d6e9245bab122c74986da94f13e286f

  • memory/2092-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/2092-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB