Analysis

  • max time kernel
    119s
  • max time network
    91s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2024, 22:25

General

  • Target

    3f81a047656d8cd8ed08c07dff46326f686e2dbbba66737f5dbf750097f92fb9N.exe

  • Size

    83KB

  • MD5

    0ed3df213e2d0990d001008af5b6c740

  • SHA1

    fce7eaddc43c68d44f7a8ca5d06d6f324b423a44

  • SHA256

    3f81a047656d8cd8ed08c07dff46326f686e2dbbba66737f5dbf750097f92fb9

  • SHA512

    f76cacfd68e1ca3516adad4d2775515eef493bb413db6e9809078e5849c84ece5df6d1772019f91c55afaba9d6fa118deaf78210c95ed7df8905fa3034fcd11d

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+kK:LJ0TAz6Mte4A+aaZx8EnCGVuk

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f81a047656d8cd8ed08c07dff46326f686e2dbbba66737f5dbf750097f92fb9N.exe
    "C:\Users\Admin\AppData\Local\Temp\3f81a047656d8cd8ed08c07dff46326f686e2dbbba66737f5dbf750097f92fb9N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-8WanLnsWlzDoUXVt.exe

    Filesize

    83KB

    MD5

    6dfb323ae281e7480ff30aef6af5171d

    SHA1

    5042aa15372d61d8d03d3f6196fd61ae76c53a1f

    SHA256

    f57f7908896989463bd375b76282a7e457e564a074e2eec4474de8ff3de27ace

    SHA512

    7cc78d0c793c74789298e992ab5b88da6e33ee18c8ac3a142a6fb48c0390c21e504adaeddc62712af375fc8454c033e7e1a389d6e5eaf5d2d20f93671727b88b

  • memory/1172-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1172-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1172-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1172-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1172-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB