Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2024, 05:19

General

  • Target

    e99f5463915ccda2b7b649fdacc00ca0ac74a1639702af25131ede24e88377f5.exe

  • Size

    83KB

  • MD5

    155baa464e9ac88d7c9eca64ce5697c0

  • SHA1

    e0b8a7134e2126e029e3abf6916401a3eec654f5

  • SHA256

    e99f5463915ccda2b7b649fdacc00ca0ac74a1639702af25131ede24e88377f5

  • SHA512

    e909809c246a2a64bcdf3358a7f985449826b5e371d58c7643dd968e4f108af08c62bbae25f1f2b0586d6b19032d9ddde034930abbff46d232ca4098d18cd2e2

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+BK:LJ0TAz6Mte4A+aaZx8EnCGVuB

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e99f5463915ccda2b7b649fdacc00ca0ac74a1639702af25131ede24e88377f5.exe
    "C:\Users\Admin\AppData\Local\Temp\e99f5463915ccda2b7b649fdacc00ca0ac74a1639702af25131ede24e88377f5.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-CcrS5zyIzqcKwEoS.exe

    Filesize

    83KB

    MD5

    c260f7b17606b5c909cc2cd03a681c87

    SHA1

    b143b25351365b39ee32fa1d45f5fa63c2b26f14

    SHA256

    b3c46ff0539c8498787a1e2af2e3bb8b3f0f4489490ba53305667b2dc3b67b82

    SHA512

    0d66056d56c47a45758020bb7475276428dae03c9205ad16ffb86ae1716345d66f690a2e4bf17e6e5b74adc95ae87cbe2e04528086bd98e36f61eedd389b0e02

  • memory/2848-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2848-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2848-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2848-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2848-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2848-29-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB