Analysis

  • max time kernel
    110s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14-10-2024 17:55

General

  • Target

    bf06e59726cef36c936e957044675fbc1a7a8fa0f65d8e4447404cc13ab637e8N.exe

  • Size

    83KB

  • MD5

    4e12780b4157a6662baab2e713703c70

  • SHA1

    7282fb4453973effedcb457f2e1bf7ad09f25564

  • SHA256

    bf06e59726cef36c936e957044675fbc1a7a8fa0f65d8e4447404cc13ab637e8

  • SHA512

    18034d9d9a06378d52d472764c4e029b63e4c4712e68cded87f3098cd1719c4953c4c7d4c63b8e08945497cf126f903bc109637959eac01343e9c3647966cb61

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+dK:LJ0TAz6Mte4A+aaZx8EnCGVud

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bf06e59726cef36c936e957044675fbc1a7a8fa0f65d8e4447404cc13ab637e8N.exe
    "C:\Users\Admin\AppData\Local\Temp\bf06e59726cef36c936e957044675fbc1a7a8fa0f65d8e4447404cc13ab637e8N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-PHsQjYCm6at81aqs.exe

    Filesize

    83KB

    MD5

    0d97db1d5e3be12058e938885533b171

    SHA1

    2902f245f921517f61a5ce70f7b8a52df903c5c1

    SHA256

    ba56b9bdcddd0714a65a266edb3a35e8a5695027e72ddf8c0d83421571139a68

    SHA512

    7b0b7b7e8882bdaa239ad0410baa2f6ccd9c0946876ec013cd0032ce3698ee7361edf5424cec3e49955d78058ef160bb2c85923dc2874260fc5252655310174e

  • memory/2120-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2120-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2120-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2120-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2120-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB