Analysis

  • max time kernel
    119s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    17/10/2024, 20:58

General

  • Target

    61d2dd54708ec0643defb129b9cf7b063d62860b37a4e8d02223175b17ed5d48N.exe

  • Size

    83KB

  • MD5

    264749d170ff2dca7a876faf7197aa20

  • SHA1

    445c316c9ab3c0469eb6820423d46b394017c462

  • SHA256

    61d2dd54708ec0643defb129b9cf7b063d62860b37a4e8d02223175b17ed5d48

  • SHA512

    38abc2f8b11bda4673598ea8505b638dc3f8d011a1f0aa4bc3f2858bc34a52dc4bf5fd5ccfd8893152779185b70dd78e82d7fe833850ad7deb2b04fabbee0c4f

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+JK:LJ0TAz6Mte4A+aaZx8EnCGVuJ

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\61d2dd54708ec0643defb129b9cf7b063d62860b37a4e8d02223175b17ed5d48N.exe
    "C:\Users\Admin\AppData\Local\Temp\61d2dd54708ec0643defb129b9cf7b063d62860b37a4e8d02223175b17ed5d48N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-IvMfczFwZ0Md3XvR.exe

    Filesize

    83KB

    MD5

    6eece257c76886ede49fb4dab56600eb

    SHA1

    00db427c7534e5bdea7cdaf1c9b65e13c378cbd2

    SHA256

    5a650fe7e7012b8a0da694688bd548c0df0d966b81a74f42e4a1413f01a15686

    SHA512

    a834bac12cb5299b4ff838514d12b61d53687b07914d375de2aaffe9ac4c4212f9be7c1012b83a15554ee04184aa9a63a10abfc16947f0c644d8524c9dc75448

  • memory/2280-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2280-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2280-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2280-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2280-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB