Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 04:59

General

  • Target

    d90c422782b5673bed822ec014a896e6123a185065334cef634c932af97845aeN.exe

  • Size

    83KB

  • MD5

    f671c7bb1547814141121dc9957ac1c0

  • SHA1

    e842c0ed2864d507563ddf99a38cb9cf7e863a99

  • SHA256

    d90c422782b5673bed822ec014a896e6123a185065334cef634c932af97845ae

  • SHA512

    419a4ac5d180ae74a8ea93981228ab93d04a10068c9f385d4bada6f89c0d911524d2cbdc3a4e02dbded3136e44e91b23e474eed11a19d02160543d6f2f9faae5

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+7K:LJ0TAz6Mte4A+aaZx8EnCGVu7

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d90c422782b5673bed822ec014a896e6123a185065334cef634c932af97845aeN.exe
    "C:\Users\Admin\AppData\Local\Temp\d90c422782b5673bed822ec014a896e6123a185065334cef634c932af97845aeN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-zPKeefOFIpifX7Wz.exe

    Filesize

    83KB

    MD5

    9d5f4e27c3f06e30c8933b6615ea72bf

    SHA1

    aab6fca6b5756a762b2c147cda209f1280dbee14

    SHA256

    3be686607c96446e186e40c52b05cd5f82045c5d9bc445b3b675dcb959d8d252

    SHA512

    62828c8bd007a16bd3c192db0b75a9b516f72cd9c61c4d6e6f73ae7d41e263d3ee31ca538aa3098f4ad63c19329dd3cbcb5648f2f24a3d442096a3b146fe2946

  • memory/304-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/304-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/304-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/304-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/304-23-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB