Analysis

  • max time kernel
    110s
  • max time network
    98s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 13:11

General

  • Target

    8fc452bbadebd2542ebc4f43e052a4a53bcd120ac007d00ae51c292116f6cc05.exe

  • Size

    83KB

  • MD5

    562eb5fead82614afdb33e3ac803a17d

  • SHA1

    9a8f247aeae729d34c787d87ed1a47829b501fef

  • SHA256

    8fc452bbadebd2542ebc4f43e052a4a53bcd120ac007d00ae51c292116f6cc05

  • SHA512

    e60896e65a58948f9224e5b2506db8cea94a2f8cfe7e5ce67e1d3958b40306528fe25ebd75a7111f028fb673074a8a66742c504c30fe7684f5bf1f77b7a326c8

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+xKq:LJ0TAz6Mte4A+aaZx8EnCGVuxF

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8fc452bbadebd2542ebc4f43e052a4a53bcd120ac007d00ae51c292116f6cc05.exe
    "C:\Users\Admin\AppData\Local\Temp\8fc452bbadebd2542ebc4f43e052a4a53bcd120ac007d00ae51c292116f6cc05.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-NQpBEIIwswWeLr6P.exe

    Filesize

    83KB

    MD5

    0a855c6ac8796efe51d9e464759b7735

    SHA1

    8b871b265d32fa7b0608926365c0258f6bf61c87

    SHA256

    52069a2e64db0c9372379cf8f5f1c2038f41b88c3fe497265e65743907c65573

    SHA512

    e8da0ca99d2c139da1371cd9b0df0be30559e885bbec1cc254f4b9b6743e914d612ac4730a095c5ae16b8f7562bba64ba89148bf8bb499a888e5265c8ab83746

  • memory/1820-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1820-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1820-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1820-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1820-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB