Analysis

  • max time kernel
    141s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    29/09/2024, 02:14

General

  • Target

    ba888613a9047618fb8877083085cf5cc91cbe579f116423e4474fd029d3a5b1.exe

  • Size

    83KB

  • MD5

    49470d71512279ddd179f9d2cc04743c

  • SHA1

    29596bf6b36ecd7aacdb12b7fe6ea75e3a7ff047

  • SHA256

    ba888613a9047618fb8877083085cf5cc91cbe579f116423e4474fd029d3a5b1

  • SHA512

    cf6dcef8caef03485012ede5319b1a1639f89a78dbf846a04269f503d6df3151e0f28e740e1dbbc811fb6db688fca221b0286679b50f2b5a3df34806da01b0c1

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+9K:LJ0TAz6Mte4A+aaZx8EnCGVu9

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ba888613a9047618fb8877083085cf5cc91cbe579f116423e4474fd029d3a5b1.exe
    "C:\Users\Admin\AppData\Local\Temp\ba888613a9047618fb8877083085cf5cc91cbe579f116423e4474fd029d3a5b1.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-rSFm9TmBvmacdIGU.exe

    Filesize

    83KB

    MD5

    dee44f9802ab3dde4c90b87b3f3f761f

    SHA1

    3af460347018ef3c4a7c05ff2bd82f8d1354c543

    SHA256

    5bb0e91c676c134e636d32c8eeccabcdaced28dde2911ddc6f74f9e65a98a2b1

    SHA512

    689fb263a0389e288f93c4622da783650b622add3c6f625e2ac2b7a4b4d42c82aa88a8a4436c4bafc387c7d5756c904537f3f23d39fce882c228edd4ed3e2bfe

  • memory/2360-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2360-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2360-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2360-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2360-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2360-29-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB