Analysis

  • max time kernel
    111s
  • max time network
    96s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 13:48

General

  • Target

    da9a657a1ca35f979ccd649ab6254aee1c246367b2defc27be60df453b0350d5N.exe

  • Size

    83KB

  • MD5

    c00070020a1374eced5b3ef40daa4140

  • SHA1

    61959e02f544a11166e9745c477bbf26674a82e7

  • SHA256

    da9a657a1ca35f979ccd649ab6254aee1c246367b2defc27be60df453b0350d5

  • SHA512

    77079eb1c2862c10fcfb73db8b7f0265e048c39cd4ea3534f266b1ec56a7dd1eb3e7f8897ff2bfe5189999b00b8504ac3662a78979c3f2126c8427fed8c50834

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+aKe:LJ0TAz6Mte4A+aaZx8EnCGVua3

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\da9a657a1ca35f979ccd649ab6254aee1c246367b2defc27be60df453b0350d5N.exe
    "C:\Users\Admin\AppData\Local\Temp\da9a657a1ca35f979ccd649ab6254aee1c246367b2defc27be60df453b0350d5N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-VUlBSxuv7LUd62oK.exe

    Filesize

    83KB

    MD5

    9f687ec28adfeea22577bd478dbe51e9

    SHA1

    b4a342ec72d211c3be852a13796f25ecef96ef23

    SHA256

    93f26db9b3806ec4e43f1f977ee66703609786a62880abd709e588c5cfe76fd8

    SHA512

    4ec1a0b715b8233bcb2f40c33412875f04360036cacbb484e195b46f0a2f6a9ad38258055cda65f583d72203b5d3c4cb29c1a995bdd1b4c795b9f73ae825b3c9

  • memory/2472-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2472-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2472-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2472-11-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2472-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2472-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB