Analysis

  • max time kernel
    110s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2024 05:07

General

  • Target

    db83aac8e0a819f21ede2a5700fe2b6e64288052dce1750a3aa0c15f9a935d4aN.exe

  • Size

    83KB

  • MD5

    4c67fa6435556e21bf2a58be773851e0

  • SHA1

    20383f262aa5486101b429d0ea3c29dd108ed413

  • SHA256

    db83aac8e0a819f21ede2a5700fe2b6e64288052dce1750a3aa0c15f9a935d4a

  • SHA512

    80921291ba79699597972d400b5ae8977a374152b558a3d10c488404981070890d436586f770168af57fcc28298e03f1e1333cf2196547ec065b122d18a8ac9b

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+lKe:LJ0TAz6Mte4A+aaZx8EnCGVul3

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\db83aac8e0a819f21ede2a5700fe2b6e64288052dce1750a3aa0c15f9a935d4aN.exe
    "C:\Users\Admin\AppData\Local\Temp\db83aac8e0a819f21ede2a5700fe2b6e64288052dce1750a3aa0c15f9a935d4aN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-oJOdj2nDctUUBLuG.exe

    Filesize

    83KB

    MD5

    2a69ae8da893e8ad28d00f37efeb9fa7

    SHA1

    4baf38cbe4359842181ae84a8f62327c90250d44

    SHA256

    5692ac0c124c6e3ae154da184d5389f554146de4b70090bcfdcd8599d7d96eb6

    SHA512

    e4a4977cdfc2d7dd8eeab5f038041c83d20a21462d28a86a70eb5b6380039f34d52e65722ceeab6992e3a54cc5f35b6cf2c1950ce4194a3c48f42029e54c6870

  • memory/2292-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2292-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2292-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2292-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2292-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB