Analysis

  • max time kernel
    110s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    10-11-2024 01:29

General

  • Target

    d36fad32e38d5150d3caf32c4651d602bf2d0d78b905c98442c0ac1ba3f9ba38N.exe

  • Size

    83KB

  • MD5

    4d8978a6c5be8379d6866d0c0d472950

  • SHA1

    f25997f20a51b5637100a5fd78b734694bf4676e

  • SHA256

    d36fad32e38d5150d3caf32c4651d602bf2d0d78b905c98442c0ac1ba3f9ba38

  • SHA512

    69a092a2f15a89026a61b1d5b65bf56f8a8b50265b79d1844b252aa8b9ae08bfb0a1165388089ac69c4a02c9dd883109590450a17cac088ed42983c65b30edb9

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+7K:LJ0TAz6Mte4A+aaZx8EnCGVu7

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d36fad32e38d5150d3caf32c4651d602bf2d0d78b905c98442c0ac1ba3f9ba38N.exe
    "C:\Users\Admin\AppData\Local\Temp\d36fad32e38d5150d3caf32c4651d602bf2d0d78b905c98442c0ac1ba3f9ba38N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2592

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-AzGzkgnJUD0BiLTb.exe

    Filesize

    83KB

    MD5

    262d64bd7605c559f4a798ad24ff9bf5

    SHA1

    65934dc3241b822d2259604e7ad0d9eb1863ce70

    SHA256

    1d06c8b841cf2adc66747ac9132bdcc8b4f2c8bb6620b6c92a16bc7a8926dfef

    SHA512

    df65004517a1538d143a7c79fb6ab68f02d0bf7057ff67d85f9d7fd4b2383f20aa51e29c1c26a68644e88182861ca7ba30dc6918dbaeffb4eae51f200d3dd98d

  • memory/2592-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2592-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2592-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2592-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2592-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB