Analysis

  • max time kernel
    110s
  • max time network
    93s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 13:35

General

  • Target

    ef4ee74a58820850b564d758d11352e090e758b699f23d660bf2da2deea9444d.exe

  • Size

    83KB

  • MD5

    85a41aba424ce489d35c175dedd34d70

  • SHA1

    c7824b167524da8f51037efd9239ae5c76787de7

  • SHA256

    ef4ee74a58820850b564d758d11352e090e758b699f23d660bf2da2deea9444d

  • SHA512

    37a36c66e65eebe287cff4c1571d655990d33521a295ba0bca9cbee029afab420f7fad4d98291458ef8b2216f4db2a4acb40d4e8adefb96eb30b4ed039143aff

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+SK1:LJ0TAz6Mte4A+aaZx8EnCGVuSK

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef4ee74a58820850b564d758d11352e090e758b699f23d660bf2da2deea9444d.exe
    "C:\Users\Admin\AppData\Local\Temp\ef4ee74a58820850b564d758d11352e090e758b699f23d660bf2da2deea9444d.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-5m05ykjH1abNbuqR.exe

    Filesize

    83KB

    MD5

    81b131cbde1e26bb1e709183a6c1869d

    SHA1

    4bb68c92532239d2b0027a2dedfd1ed7dd6afcd0

    SHA256

    d8b1023d959291be560e2bea0fa627d7c93c8fb57a53647ec193c4a9f4a9f458

    SHA512

    09fb72c91ed91c4fd4283e86e3af01f3a0f0b5bf6ddcd98fdbd5aeecf40aad4d45f8d3de1407d402590ab5380c6451a82f6dc3884e8161b6ef4bfea066e979b6

  • memory/2816-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2816-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2816-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2816-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2816-16-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2816-23-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB