Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2024 05:14

General

  • Target

    ede3c77e04e8854ac5ffb2e6f106f02bb333d676c288112a18eeb8313db0987eN.exe

  • Size

    83KB

  • MD5

    4034032b03f635e2750ed9b93d97de20

  • SHA1

    c7a50b90004a752932dab0e2cfa4e56efdcbf989

  • SHA256

    ede3c77e04e8854ac5ffb2e6f106f02bb333d676c288112a18eeb8313db0987e

  • SHA512

    0405c27464256a2a13a030958933327926ac0f5d6e32930ed63a6a2c9eb6e1cf1936af8e7fd1a6162c25ec7b0ae1a5dbfb1badec92ea2cda558e6d1a16df28b1

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+LKK:LJ0TAz6Mte4A+aaZx8EnCGVuL1

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ede3c77e04e8854ac5ffb2e6f106f02bb333d676c288112a18eeb8313db0987eN.exe
    "C:\Users\Admin\AppData\Local\Temp\ede3c77e04e8854ac5ffb2e6f106f02bb333d676c288112a18eeb8313db0987eN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-3gYan1zMrRyk6zC9.exe

    Filesize

    83KB

    MD5

    2238abb3029304ce3b242e4c49940a57

    SHA1

    bdebe6c8123326c7267f1420ee1f542b0b4416e1

    SHA256

    c3adbf073e7706698acfe58bfd942422fab2689603bac0e8b30438c00d9566f3

    SHA512

    2e8c827abacd37e2457e8804aa7455d6e43c86aa4016e0ad76a441ac0e56653b1efcface230d5a2c3b0627e78dc39111f7769785bd54db349247be4c579fdbd7

  • memory/2848-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2848-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2848-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2848-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2848-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB