Analysis

  • max time kernel
    110s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2024, 08:06

General

  • Target

    ae1d01ec23deff33aec977b13a8d3cf329112e6c727b5a243d39574e23c7226fN.exe

  • Size

    83KB

  • MD5

    609382682ca5c0cbf2838e74c5f1e4e0

  • SHA1

    2426b87e37780e65606862c904e107cf4c78c2bd

  • SHA256

    ae1d01ec23deff33aec977b13a8d3cf329112e6c727b5a243d39574e23c7226f

  • SHA512

    0dc26631c8daeb241654d3fbec46d6b71bdae36b09aafad85207373d490699569120fe6064acf46a1f1751849a6e8fb9d738f7ebc2dbf798a037621bfe456b60

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+wK:LJ0TAz6Mte4A+aaZx8EnCGVuw

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae1d01ec23deff33aec977b13a8d3cf329112e6c727b5a243d39574e23c7226fN.exe
    "C:\Users\Admin\AppData\Local\Temp\ae1d01ec23deff33aec977b13a8d3cf329112e6c727b5a243d39574e23c7226fN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-YzHFlyMM0ELWHLVY.exe

    Filesize

    83KB

    MD5

    20044349de63c489ffc07032b1b65a16

    SHA1

    53f54622ffd57826ed1fa6485d2aa6efc0351e28

    SHA256

    4918d738f9210145b6b1ad6528de20bc64613d21aff96ee131ed55ca6f3be040

    SHA512

    c334bb9f122bf0cdc159a16df151f9d08ee248353816473298744077a169283e74ffe39fc4031f1ef2f8b2d6b6dd245710c710c56d09954c6c987a64d66a5157

  • memory/2496-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2496-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2496-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2496-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2496-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB