Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 15:34

General

  • Target

    bb641767fae16a5cabfb28ac16cff8202e31827147363f13efcfbf12ec1b07bdN.exe

  • Size

    83KB

  • MD5

    172d37d6400a285ac5f180cd39b80c20

  • SHA1

    b610db47c0e49baab443b1aefb2e6f142f55c1e2

  • SHA256

    bb641767fae16a5cabfb28ac16cff8202e31827147363f13efcfbf12ec1b07bd

  • SHA512

    99b44100db03fd4b850b8cc570806b7ce6ccdaec66356a17a8bb0934c2f9b55450cf443067c43190a5f1319351340cdcc6c406f263b76148d81fcae93e4bfb1e

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+xK:LJ0TAz6Mte4A+aaZx8EnCGVux

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb641767fae16a5cabfb28ac16cff8202e31827147363f13efcfbf12ec1b07bdN.exe
    "C:\Users\Admin\AppData\Local\Temp\bb641767fae16a5cabfb28ac16cff8202e31827147363f13efcfbf12ec1b07bdN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-a4uxniDXCrGesvEt.exe

    Filesize

    83KB

    MD5

    6755c161e1398da3c4b9f6bac646941b

    SHA1

    34e7ee4028e30e9faf9eb4a93bc7f4ed6085de1c

    SHA256

    398c6141e94170f82071950c1da253e321ad371f697370ea058818bb43e00cee

    SHA512

    3419644d4c64fdf5c00a929ae15dff91401c19391c6b40a26719c7b4b9f3a30e90814471373073e821b0224abd36d1b5dd1de21b9cb90b1c47e841462f007473

  • memory/2448-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2448-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2448-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2448-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2448-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB