Analysis

  • max time kernel
    141s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 00:07

General

  • Target

    73b4c9d75c2b4be37f4717dbc3288bd6d3c91c6eeaf8fece9bf82bbf375133a5.exe

  • Size

    83KB

  • MD5

    7341f9f0bd7633a6cf17905220934357

  • SHA1

    bf77751bc3bc4eec71622cbb3a3e1e2c5f3d4150

  • SHA256

    73b4c9d75c2b4be37f4717dbc3288bd6d3c91c6eeaf8fece9bf82bbf375133a5

  • SHA512

    a7d0cb1228a5720bedc07994018fcec92157ba0fc571fcb8b92fc9bdb87e062310b56312cd003c6730364047e61d2c17807c5057f19a73c1fd51775cc9826635

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+mKK:LJ0TAz6Mte4A+aaZx8EnCGVumB

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\73b4c9d75c2b4be37f4717dbc3288bd6d3c91c6eeaf8fece9bf82bbf375133a5.exe
    "C:\Users\Admin\AppData\Local\Temp\73b4c9d75c2b4be37f4717dbc3288bd6d3c91c6eeaf8fece9bf82bbf375133a5.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-qkDh2Bm3mPSj7sk6.exe

    Filesize

    83KB

    MD5

    925efe30be52262209f1b83dea43b194

    SHA1

    ec762efe94279cf79f52c84d05648aa8847f0695

    SHA256

    926f84c03ecd083bbbfb94344d41a829c079b473bf713ee0196ae18b636da573

    SHA512

    b6d3b021fe5235578fa5316fe58f0d543513cb3f2c02fdd9d909a2584df663997e93444112bb6b6cc04f0017e5ad1f90d19e6b2390232fef29a06559ae61999a

  • memory/2904-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2904-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2904-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2904-16-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2904-23-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2904-30-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB