Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 00:31

General

  • Target

    062bb003b2ba7c7c24157eee4fdd3a446a43edf087518347a35cfeb0646461b0N.exe

  • Size

    83KB

  • MD5

    11baafc18f84eca21620ac5d86f3f6e0

  • SHA1

    d1aa0047e140ae5fbef1b176c2298265e55f3920

  • SHA256

    062bb003b2ba7c7c24157eee4fdd3a446a43edf087518347a35cfeb0646461b0

  • SHA512

    f9d868d24ef50a942ba5e2314d9b6997524cb0038875dd44f9463133a21879838fce41689fccb912c90789dd124904c0747ab592da9ec7009e48e8e009fcefc7

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+NK:LJ0TAz6Mte4A+aaZx8EnCGVuN

Score
7/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\062bb003b2ba7c7c24157eee4fdd3a446a43edf087518347a35cfeb0646461b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\062bb003b2ba7c7c24157eee4fdd3a446a43edf087518347a35cfeb0646461b0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-D019pKfHOesapghB.exe

    Filesize

    83KB

    MD5

    46df68f499a87c367fd520b0e3dedec1

    SHA1

    b40de9d3225c5b32274303a0a4d4b352f1c5edb9

    SHA256

    9f8055a297168319d00ca4471463a9b918059c5c077b6d9652c42cba1ebcfffb

    SHA512

    499e2bedb145bd6998fc2d9d059d1eb018ff7fda7e319b79789e6f90cf1666f9d70000ac66cd7e317dbb2f14d84bfc11971d156185ab40a225431137ab337468

  • memory/2712-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2712-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2712-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2712-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2712-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB