Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-11-2024 01:31

General

  • Target

    1623744f3fed4f0d26f9d21aee847294f1bc4a1c1532c627a2e71ad891f03f17N.exe

  • Size

    83KB

  • MD5

    aec0b1f68a7aa95451bf9adc802d2100

  • SHA1

    31dbeaeaee1de48d18cea1b084e13d09fab8c413

  • SHA256

    1623744f3fed4f0d26f9d21aee847294f1bc4a1c1532c627a2e71ad891f03f17

  • SHA512

    672147ab276cc9dda2c45060998ff4b4b507cd6d99bbb0c6231cdf9d703971e76095a2dd2c2f32240ff0e5895a422c3f92ed4a117a149ebefba441e76c51778d

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+oK:LJ0TAz6Mte4A+aaZx8EnCGVuo

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1623744f3fed4f0d26f9d21aee847294f1bc4a1c1532c627a2e71ad891f03f17N.exe
    "C:\Users\Admin\AppData\Local\Temp\1623744f3fed4f0d26f9d21aee847294f1bc4a1c1532c627a2e71ad891f03f17N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-tMDU6RJRQT8uvDa2.exe

    Filesize

    83KB

    MD5

    1dcf5716e82ec8691abf54afa7443c70

    SHA1

    5c1de1b1d5c58b082689060c550a87c9693806e8

    SHA256

    a3bc5327b641aa5fae3455dbe681b213d7ef7c53cf76aa8c26ff9c700dd0f138

    SHA512

    c96c03c050d7cd9eec81012e6a6e38e573a177924a8f99b78af5d0b27c6ac1dedd3c11765cab810f811eae268cbc672a084479667a5fdba5597f8a8248d67c22

  • memory/2188-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2188-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2188-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2188-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2188-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB