Analysis

  • max time kernel
    110s
  • max time network
    91s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2024 05:06

General

  • Target

    4219e91bd63e20bad0256da0b25f01af4f94c6ca9ec565462d10eef0e9e89d3bN.exe

  • Size

    83KB

  • MD5

    c21c4df6c871492e09a0c462fc9b6220

  • SHA1

    6eea9bd5c7455e1de0415f2f0a47c5cf7c60ffbc

  • SHA256

    4219e91bd63e20bad0256da0b25f01af4f94c6ca9ec565462d10eef0e9e89d3b

  • SHA512

    41b67d3b3bd8871d4e4ef42fb790e8f94859c39d8109c3bf7cf63b62f61d7e4ce65730c221f366fa694fe6be203769f1bd15d93af52fa6748911b8fdb3009caa

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+6K+:LJ0TAz6Mte4A+aaZx8EnCGVu6n

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4219e91bd63e20bad0256da0b25f01af4f94c6ca9ec565462d10eef0e9e89d3bN.exe
    "C:\Users\Admin\AppData\Local\Temp\4219e91bd63e20bad0256da0b25f01af4f94c6ca9ec565462d10eef0e9e89d3bN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-qzdqRtxvgcogsWhf.exe

    Filesize

    83KB

    MD5

    dd1d1e174561ae6a5605a4dac8d65851

    SHA1

    d8b4b45d396ed745db6cdd55e8e37101c773d4d2

    SHA256

    48dcd172f5d13d78cd800aae7beb81e75f6d7ee8981e1bcfca0eb92c323605bd

    SHA512

    cfb60ca17dfaec06d63c82760a87437d05a4fa96a1a6906c56981f7e1c0104891e751e5c53b4b65b099bf8b2d94cc1caa303d0d903d7fc764e915d1ea12c3911

  • memory/2288-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2288-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2288-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2288-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2288-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB