Analysis

  • max time kernel
    111s
  • max time network
    98s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 16:10

General

  • Target

    e6a987f603a2cb6000b2cc857ec8113fd319785df833adcbdd7b94dc299eaca8.exe

  • Size

    83KB

  • MD5

    fb1e97c5ea6b7bf5e4f89a953b9b3914

  • SHA1

    b5d34b1e46083339a3b091585e92d33a8377332f

  • SHA256

    e6a987f603a2cb6000b2cc857ec8113fd319785df833adcbdd7b94dc299eaca8

  • SHA512

    159d705daefea2e551730d4217cffc3f141e7425654dc6e4458b4f8ca722a77eea0b44c4c33be935e180de54f8dfe85c3eefa5bc698bf6499f8d867421f1aa0f

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+MPKO:LJ0TAz6Mte4A+aaZx8EnCGVuUP

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e6a987f603a2cb6000b2cc857ec8113fd319785df833adcbdd7b94dc299eaca8.exe
    "C:\Users\Admin\AppData\Local\Temp\e6a987f603a2cb6000b2cc857ec8113fd319785df833adcbdd7b94dc299eaca8.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-MXN36whY6WPRNqaS.exe

    Filesize

    83KB

    MD5

    71879788360aaa1d587024fbeed8c387

    SHA1

    43985b0f247a06f8a24fd135ef8c215cfa11910f

    SHA256

    c7ee13f950fbf80da56efa7ae8a920dd04fb053705f0ee39d9a9d75c0d8f1dff

    SHA512

    cfa2b739cf6047401b0dba52cf2f0d0fc8be9bc558f002a1f8031be47005345cf7a8f8555b8812ee881d6a94604e4bb380eb13888e03e86cec0f1548917b4dbd

  • memory/3064-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3064-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3064-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3064-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3064-23-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB