Analysis

  • max time kernel
    119s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2025 09:18

General

  • Target

    351d3fb44b62524f0cd0d5193357e9068c103a10a02c3f5234bb69cafaa12fc6N.exe

  • Size

    83KB

  • MD5

    f3f1b69c2543153ae3047a67a75b91c0

  • SHA1

    c9a6615e04ff11c5d498ebbfe7fb41157b73b839

  • SHA256

    351d3fb44b62524f0cd0d5193357e9068c103a10a02c3f5234bb69cafaa12fc6

  • SHA512

    46a2696681d37eae8c89f6c3e57a77f62df0b506d97a26b6d4539c24ff0ddec364901e15fa7333edc741f827487e7a2070dfc15c35339b1161132e3d69621326

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+uKO:LJ0TAz6Mte4A+aaZx8EnCGVuuv

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\351d3fb44b62524f0cd0d5193357e9068c103a10a02c3f5234bb69cafaa12fc6N.exe
    "C:\Users\Admin\AppData\Local\Temp\351d3fb44b62524f0cd0d5193357e9068c103a10a02c3f5234bb69cafaa12fc6N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-Oo9Ls8j9YzdFA63g.exe

    Filesize

    83KB

    MD5

    8bc6f92ad24c5a897f61d2cdcd213e19

    SHA1

    7bef2c6c161ece41bf2a5967178deaf732da1e86

    SHA256

    741cea1d10174640e780c3269619805edb1494384f3b022cc011625259e58c6b

    SHA512

    7b408447bbcb5adaef94c03a5d0a631c75e66b2133007e5ca896c89d250f1b7cf6914aa9013ca04df79e8ec5676426d34423389c6d5439898cee0339fd87860d

  • memory/1996-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1996-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1996-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1996-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1996-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB