Analysis

  • max time kernel
    110s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 19:08

General

  • Target

    b2028a2f55c67bc0d4f9d67f5b8fd990e5760c8647b10bb4e894f183003c8a2fN.exe

  • Size

    83KB

  • MD5

    d082ccd9273e1b30e2f6a6537a7f4880

  • SHA1

    29385dddc0ee0fc6f73f833997eb89baac986928

  • SHA256

    b2028a2f55c67bc0d4f9d67f5b8fd990e5760c8647b10bb4e894f183003c8a2f

  • SHA512

    37363b327d547e429aad67c0a7ee16534c7a785a10e4c4a481a5c97757e7903b1c52b48b00cf437506fd3242e9f2bfe4c541aef45a9355520993c713c34459d2

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+MK:LJ0TAz6Mte4A+aaZx8EnCGVuM

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2028a2f55c67bc0d4f9d67f5b8fd990e5760c8647b10bb4e894f183003c8a2fN.exe
    "C:\Users\Admin\AppData\Local\Temp\b2028a2f55c67bc0d4f9d67f5b8fd990e5760c8647b10bb4e894f183003c8a2fN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-WmNa2Jv518FgucFA.exe

    Filesize

    83KB

    MD5

    f82af2a90ae37017933f335f2b822373

    SHA1

    dcbb0b267b57ef1b2e6404a0893ae1b42196ee58

    SHA256

    dae1645c0fe8a7f8662f615c864ac640c0e0cee18582e5c029cccd63c7cbba16

    SHA512

    a988d892292e74eeb79b0779d9345b23dbc3dbdb7fa8843503646c6c5ec22e8cb6e640e40e88ec64d9c0ad7a9b82707898d79d9a89adebd99409152a8999d1f2

  • memory/2584-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2584-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2584-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2584-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2584-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB