Analysis

  • max time kernel
    119s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-10-2024 10:42

General

  • Target

    5ee62dc21ec17fc11c9721e2725f62a8b3e66d643b3f17502fef0a3cbc19f015N.exe

  • Size

    83KB

  • MD5

    99ee421d0eb6ffb3837656bac5424d10

  • SHA1

    8c19274e6c473442b313dda362ba6cdf2adf5cf7

  • SHA256

    5ee62dc21ec17fc11c9721e2725f62a8b3e66d643b3f17502fef0a3cbc19f015

  • SHA512

    afec86ad2ba8cd2e50100e47bf8a663c2bad4b1438ef6504ed98dfb82bc3a78e54ee1809393e7d118af59fafe1879699aac900f1224f0483197940c7e47cc76c

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+7K:LJ0TAz6Mte4A+aaZx8EnCGVu7

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ee62dc21ec17fc11c9721e2725f62a8b3e66d643b3f17502fef0a3cbc19f015N.exe
    "C:\Users\Admin\AppData\Local\Temp\5ee62dc21ec17fc11c9721e2725f62a8b3e66d643b3f17502fef0a3cbc19f015N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-QtfWTvYelRJXVM8G.exe

    Filesize

    83KB

    MD5

    5c00393ae36e8d65367eb305ef6c7339

    SHA1

    a52fddd38cac5d7a2dcf9d1df6263d8364c0c594

    SHA256

    97289c190c778fa79e15e274b1f6d8adb5115f0cc1635380be8740d4ba3fae60

    SHA512

    e591edef49b31b9566d6ee48650216943aac8420d94ad6cd627b549fae4e384a0bea2319ad3340a6514826409ad345541382bca950c12bcc669af34ad794174d

  • memory/2920-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2920-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2920-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2920-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2920-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB