Analysis

  • max time kernel
    110s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18/10/2024, 07:12

General

  • Target

    cf8b31aaf441fbabf33bc55b185d8bfdffa830411c698b7f8523c24c156691c0N.exe

  • Size

    83KB

  • MD5

    ca8fec34ada7002af7a966b5f06e06d0

  • SHA1

    f7c13b57b411235f5d949acb0aa9dadc6a1945c9

  • SHA256

    cf8b31aaf441fbabf33bc55b185d8bfdffa830411c698b7f8523c24c156691c0

  • SHA512

    b91980ff018409813c34db51e2f65e730b8784ccce3440f60cb033c9885a4df4efc6aa21c6da2620706f1485436c5b05106ad0fe5a776be05a1578dd0837202d

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+wK:LJ0TAz6Mte4A+aaZx8EnCGVuw

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf8b31aaf441fbabf33bc55b185d8bfdffa830411c698b7f8523c24c156691c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\cf8b31aaf441fbabf33bc55b185d8bfdffa830411c698b7f8523c24c156691c0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-fPT1eL7nyMwq4f1D.exe

    Filesize

    83KB

    MD5

    ba4ebd2ec1c570d1ccdaea4352da86e7

    SHA1

    c1cd01fbe037410e36450fa0291d1c557f70de33

    SHA256

    74ea1c93ee6adab974f28c506bab3198b1b09795a089edf41f52c66579087310

    SHA512

    38d53206ff1058c706f0de14c72575292d3bcd0a00046589d67ac0c2304f0df9feffc7d606b9417115c29f9ce3842c97a466e9a2cfbab4bd05cf3565869a0d65

  • memory/2728-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2728-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2728-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2728-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2728-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB