Analysis

  • max time kernel
    110s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-11-2024 01:34

General

  • Target

    60594b322aa6b28ab28e4bf697012e6f5cb679e34d0bc4dc19a7607b60ac42e6N.exe

  • Size

    83KB

  • MD5

    a4e1cdbbe9e4284dcce72e6ba139ad90

  • SHA1

    e1cae05863fa5c9236a7ce7936d19ecd48d8246d

  • SHA256

    60594b322aa6b28ab28e4bf697012e6f5cb679e34d0bc4dc19a7607b60ac42e6

  • SHA512

    92dbbec4beee1115b355acac71234d2c0d56d4e04282c003570298d8a77c18d62ab1b115234b1bbc24ace720e7b11860f3a07efd62d3835c212a6c1b5181d941

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+bK:LJ0TAz6Mte4A+aaZx8EnCGVub

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\60594b322aa6b28ab28e4bf697012e6f5cb679e34d0bc4dc19a7607b60ac42e6N.exe
    "C:\Users\Admin\AppData\Local\Temp\60594b322aa6b28ab28e4bf697012e6f5cb679e34d0bc4dc19a7607b60ac42e6N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-XAanlSe8Ex1zcD7I.exe

    Filesize

    83KB

    MD5

    1aa2efadc8aa1b5a1b048f71c8659396

    SHA1

    b0195e162f6e6e6bfac3b33393033f12d4b399ca

    SHA256

    34848a2f193c9b203002dfff40507640e7842628e2ea8ca9378dce40201603f8

    SHA512

    f68935c53b646455fadd1132c4142d21e2ebfe4a3bca1060ab66a4299b634b98e69c254e9f71beedb7d78a495bfcaed464e035d9efa99215cdfe93038e323073

  • memory/3040-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3040-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3040-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3040-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3040-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB