Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-10-2024 07:18

General

  • Target

    1a884b7fb5417ac8d3efda2135ffd3f10fa48bf238751a75576e632bb31cbf4dN.exe

  • Size

    83KB

  • MD5

    f500c17e206de1d54abbf3c89c96d330

  • SHA1

    88450c8aa95b97eb9acf476b43f6e1aeb65369ec

  • SHA256

    1a884b7fb5417ac8d3efda2135ffd3f10fa48bf238751a75576e632bb31cbf4d

  • SHA512

    b4b34776a4b44ae1502c7e20df53fcc1a3c8fe0f07d609d113b672bda505e2a72c81e0861207a160ed9d0c70c7e0ebfdcdad1ce51cf4588888f76e6343b58496

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+qK:LJ0TAz6Mte4A+aaZx8EnCGVuq

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a884b7fb5417ac8d3efda2135ffd3f10fa48bf238751a75576e632bb31cbf4dN.exe
    "C:\Users\Admin\AppData\Local\Temp\1a884b7fb5417ac8d3efda2135ffd3f10fa48bf238751a75576e632bb31cbf4dN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-PBvzzBECARxRW3Vx.exe

    Filesize

    83KB

    MD5

    3a5adef7694c9b9d19891e05e40b767a

    SHA1

    b4fb8e1391a685960dab593505c4cf5bc0848290

    SHA256

    74c091b46f3dc4b8f067d71e745f8799fa3e8a01602ef9f6eeef9b8d2dba5b38

    SHA512

    e4594c2d5df768408478390ca9d9fc6c1d9df63be26544fb7826236c2a6d70262ad1993eb5bfaaeecd0f40f5b5211aef7f391bc0e61854184b3772d7e82edabd

  • memory/1868-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1868-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1868-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1868-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1868-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB