Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2024 05:10

General

  • Target

    c90bc8f6f6ecdff2ea35d9f9772f16722ab309bb4b524f2d035c5b64f55f70b7N.exe

  • Size

    83KB

  • MD5

    85af1f080434e8a9c86856f6dfd98050

  • SHA1

    d3341114b9e6ed7d86860eb23341030dbfc30389

  • SHA256

    c90bc8f6f6ecdff2ea35d9f9772f16722ab309bb4b524f2d035c5b64f55f70b7

  • SHA512

    28f4d485e78a0dfd26a807bde7d669e622b12891620ad06b9c4f57c529d91191f0c95179fda3de0adc9a6c248bd70cc1ce647ebcc02963503b45e61079e7752d

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+OK6:LJ0TAz6Mte4A+aaZx8EnCGVuOd

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c90bc8f6f6ecdff2ea35d9f9772f16722ab309bb4b524f2d035c5b64f55f70b7N.exe
    "C:\Users\Admin\AppData\Local\Temp\c90bc8f6f6ecdff2ea35d9f9772f16722ab309bb4b524f2d035c5b64f55f70b7N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-CV6uX47gBt8WgI3K.exe

    Filesize

    83KB

    MD5

    4f0c455b0a9a0c89f27d1e1f6912feee

    SHA1

    066e518ddb4064437a992d7d5c525b440018ada2

    SHA256

    5f5b6871ed2ef971c144968555846fabf90c94face15daa79fe7617f808f0b7a

    SHA512

    7de5fb4d2b9b1e183f921f42d0d8e246cb51eaf350dcdaa245b81d3dae3acde62bc3b16531025cf94b479065684bcb4facd7a914856b6ae87e637596ee4f2f9e

  • memory/1976-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1976-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1976-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1976-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1976-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB