Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 14:13

General

  • Target

    47a71cdf07bb927deeccd6e986965ad543b42bef8b0a630a9549dfb7b57dac1f.exe

  • Size

    83KB

  • MD5

    85802bdfe4d0fbac5372f870869ef01f

  • SHA1

    6153de0b722e9701ec071bd0983ed02130b53738

  • SHA256

    47a71cdf07bb927deeccd6e986965ad543b42bef8b0a630a9549dfb7b57dac1f

  • SHA512

    6533bfa47b708992f64db0634a609be928436566bfbd74f9e53e19383c6204c9afb19412a19830555ec37d726c50c8417706d71440893c953cdcc112f4479ab1

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+iK6:LJ0TAz6Mte4A+aaZx8EnCGVuid

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\47a71cdf07bb927deeccd6e986965ad543b42bef8b0a630a9549dfb7b57dac1f.exe
    "C:\Users\Admin\AppData\Local\Temp\47a71cdf07bb927deeccd6e986965ad543b42bef8b0a630a9549dfb7b57dac1f.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-mcVrSYt9137xfRp5.exe

    Filesize

    83KB

    MD5

    c18abf4d0077b5bdf2e544cf0924edbd

    SHA1

    dd0cbe5e667beeaa337a6eaa2416bcfb0a3b8fcb

    SHA256

    bd00606f643231448b1ccae6526522cd54db44bc7a77fa19d38c476b1ede54f6

    SHA512

    9629d5217d26f1138f1fdb83edfa1b051cbfcb23043981804cd5671dda9c37c4dcd06af7ad5243874da19938d6bb5e7b44977e22a7e9978f9c8c68007637b830

  • memory/3000-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3000-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3000-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3000-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3000-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB