Analysis

  • max time kernel
    111s
  • max time network
    96s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2024, 09:50

General

  • Target

    76b23824ef72ec922032582a9ca760c73152d5bd787ec0332929f7348b245bf0N.exe

  • Size

    83KB

  • MD5

    dc78de567cd828b680aec4816a6726d0

  • SHA1

    5e80f215cfecfb844cf080c8170f0fd97a7a00f0

  • SHA256

    76b23824ef72ec922032582a9ca760c73152d5bd787ec0332929f7348b245bf0

  • SHA512

    eba1b8c45c5962cb73a3d028e1475ed43612a949fbeb9e3ee0e14255905438b3301e5eebb3fbc4117340491202133f78795e93b933c4154c07f49a9531c1f76e

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+UKk:LJ0TAz6Mte4A+aaZx8EnCGVuU/

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\76b23824ef72ec922032582a9ca760c73152d5bd787ec0332929f7348b245bf0N.exe
    "C:\Users\Admin\AppData\Local\Temp\76b23824ef72ec922032582a9ca760c73152d5bd787ec0332929f7348b245bf0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-ae3NFp8fBZLuL3d1.exe

    Filesize

    83KB

    MD5

    83bf0bd6f81bdea2b80751c80a77dda7

    SHA1

    14dbc60914184716de8683d0666aa9b1f00428ae

    SHA256

    7274168b6736f0f6453b5fb1171a07863318a56dac785367d92aadc7eec0537e

    SHA512

    6b237ca12200cae03c715cce161502a281bff5cea4c7c427cae633cd6b4c29e7bf6842045ff77983d9bea3ddfd83323f16b7118bbc088aa94b70d833dc85ffeb

  • memory/3012-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3012-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3012-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3012-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3012-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB