Analysis

  • max time kernel
    110s
  • max time network
    99s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 11:55

General

  • Target

    e8b6eec4516382d9e26554eb693224190c268d83b9fb438471abdbd9f7995ba3.exe

  • Size

    83KB

  • MD5

    3a5a42a7689a9c62efb60db869884d19

  • SHA1

    0fa2496346b9c103fc98ba241552521a78d2d745

  • SHA256

    e8b6eec4516382d9e26554eb693224190c268d83b9fb438471abdbd9f7995ba3

  • SHA512

    fd36f199de5e2ba3581e00bcb578ba03b9b1cf52d2f6d08aeb079b3b5641f54eed24e47b21e62a866b901cbd44c8e81b1356c9d40439c0b4df666131b055365e

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+jKu:LJ0TAz6Mte4A+aaZx8EnCGVujf

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8b6eec4516382d9e26554eb693224190c268d83b9fb438471abdbd9f7995ba3.exe
    "C:\Users\Admin\AppData\Local\Temp\e8b6eec4516382d9e26554eb693224190c268d83b9fb438471abdbd9f7995ba3.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-0WIj9RRjR1oGZY0L.exe

    Filesize

    83KB

    MD5

    2752ec6717b38e6193aa9d4e0e7972bd

    SHA1

    23f0d5dc497f27d08752fc2aaf3b54a8aec66dd3

    SHA256

    5d45bb9fc2c0143181c6a9a8f44fb31e278b642e4d08fd096b885c89857792b8

    SHA512

    3c62739f9dad77c36b148525007d224446410d4911880deddb9ba5c688a7926459723d5a2081dea9e012a36b5877658b4db007ac39d888e62fd5f7f28b07427e

  • memory/2388-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2388-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2388-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2388-11-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2388-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2388-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB