Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2024 05:21

General

  • Target

    e69ce9f988f1e51f4584b76a7154d235af51ff54086e449ac5fc144f4f494740N.exe

  • Size

    83KB

  • MD5

    205a73c597b9173817f31ff17fbe8430

  • SHA1

    fdf4ab227757556d8e0fb8f0257080bb27beaaae

  • SHA256

    e69ce9f988f1e51f4584b76a7154d235af51ff54086e449ac5fc144f4f494740

  • SHA512

    9edf0a958878dec4ae64fedb411aee5ffe5acac11c9fd1cb34374cc15775c619a39537823a52232f9d834e0dead76eabfdf922f0d3db0b939e8ad3921f46cc8a

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+JK:LJ0TAz6Mte4A+aaZx8EnCGVuJ

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e69ce9f988f1e51f4584b76a7154d235af51ff54086e449ac5fc144f4f494740N.exe
    "C:\Users\Admin\AppData\Local\Temp\e69ce9f988f1e51f4584b76a7154d235af51ff54086e449ac5fc144f4f494740N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-OQb4nN5Ejk8zpami.exe

    Filesize

    83KB

    MD5

    062b8b092db6cf97354903fad7cf989f

    SHA1

    d60155c55637ffcbc69ea845105f67b71b61fdf3

    SHA256

    a552b4a43d00b52c9e5d117ac2a7bc59c8d4185a2bfb9528f42aab3a1783fc0b

    SHA512

    14543347947eac3ff3830b9c020dee5dbfcebdb3aef7070c828dfef752b10209144141190130b38d321704988efd2188f79328c25f2fac0a07d4ce2a0c38e574

  • memory/2692-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2692-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2692-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2692-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2692-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB