Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18/10/2024, 09:29

General

  • Target

    66ea0dc2e2e8113693babf9341186ab7708ec3a25e75719ddc6715ceae98d646N.exe

  • Size

    83KB

  • MD5

    0a7a3bd24d262038c6fb9100b7c6e580

  • SHA1

    2852ecef112d0179a85651de1ef5104e5a77f964

  • SHA256

    66ea0dc2e2e8113693babf9341186ab7708ec3a25e75719ddc6715ceae98d646

  • SHA512

    b88d90c417998038b6862c4d0bcdf45a0a0640dadb3e49bc3c33541f20e56cc850527e48b200381d3344a4c3e440a280fc9cd7bc71d61ee211f8a1f3a58b2dbe

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+sK:LJ0TAz6Mte4A+aaZx8EnCGVus

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\66ea0dc2e2e8113693babf9341186ab7708ec3a25e75719ddc6715ceae98d646N.exe
    "C:\Users\Admin\AppData\Local\Temp\66ea0dc2e2e8113693babf9341186ab7708ec3a25e75719ddc6715ceae98d646N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2364

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-lGrdyaoX0FYaBH79.exe

          Filesize

          83KB

          MD5

          91c0e179974b5e431ab04271b69f4a3e

          SHA1

          fcd3ad2215e1b0b9336ed393714c80d11c35d2d6

          SHA256

          1685fb825e0854a6834549d468c884278f42a5420f7ba8dfb6dbadb5fd8aadf5

          SHA512

          850ddce9c5a1b440e49a09da63124e7a31d1bed5a28183356527c561040686dfbc63d9ff84ed52e76c3d04faa6e09a3196fd10ef7e082f30fd897bcc1e5054f6

        • memory/2364-0-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2364-1-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2364-7-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2364-14-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2364-22-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB