Analysis

  • max time kernel
    119s
  • max time network
    93s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 16:47

General

  • Target

    ebf1df737c009da8c96d89f5f9d171eeecede7d9372ce40a9f7ce18fee9c5066N.exe

  • Size

    83KB

  • MD5

    086732a681efff10f9283bcfbe462060

  • SHA1

    f9878c3c67f0e1119843ac59c3b3234569662c5d

  • SHA256

    ebf1df737c009da8c96d89f5f9d171eeecede7d9372ce40a9f7ce18fee9c5066

  • SHA512

    fa72b967614f3c57fb82c80f51f019868cc7ab46dd5cfcc7ba33359339f950c8c6f516913498a085c0c370e91dc5ea25fb9c3ad0fb6f64b72c949b8193f7215c

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+ZK6:LJ0TAz6Mte4A+aaZx8EnCGVuZd

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ebf1df737c009da8c96d89f5f9d171eeecede7d9372ce40a9f7ce18fee9c5066N.exe
    "C:\Users\Admin\AppData\Local\Temp\ebf1df737c009da8c96d89f5f9d171eeecede7d9372ce40a9f7ce18fee9c5066N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-C5hhmExGC14IV7xQ.exe

    Filesize

    83KB

    MD5

    728bfc395071790db6548b2133f061d0

    SHA1

    e42ea023d51c2e9dd36d95030cb20daccf80bc63

    SHA256

    efc9cff22fe68b33cb5771284d53ded824ea363b336d9b643307b3c7b0afd410

    SHA512

    ddda302a280e0756908b50074ac96d2a079260d3b79b23832399b2674cd727490f9fcb9f0e32014e6e7e649ad5ce91c669893195dcf470ceb5aa44f9eb91e7ae

  • memory/2112-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2112-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2112-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2112-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2112-23-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB