Analysis

  • max time kernel
    110s
  • max time network
    103s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 18:03

General

  • Target

    c0f696645ccd38c33d08649dd1d6f293d140500de9c9cbc29985b96ccc8b970eN.exe

  • Size

    83KB

  • MD5

    00b9055fdaad60876be55467e610e1a0

  • SHA1

    3c313b381ba8ab69eb826fb6d1b9cf45fe15145d

  • SHA256

    c0f696645ccd38c33d08649dd1d6f293d140500de9c9cbc29985b96ccc8b970e

  • SHA512

    9edd4a77dfc5e07ba09a17c3bce6c067b829735ea2ba1fa83c4bcc70a199fc72e2035ef7cc060b5746cdb7e5b7b84d328e7342e468c6c0f4a5ad8782098e6bb0

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+wK:LJ0TAz6Mte4A+aaZx8EnCGVuw

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0f696645ccd38c33d08649dd1d6f293d140500de9c9cbc29985b96ccc8b970eN.exe
    "C:\Users\Admin\AppData\Local\Temp\c0f696645ccd38c33d08649dd1d6f293d140500de9c9cbc29985b96ccc8b970eN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1444

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-jDurhk6599pkRwth.exe

    Filesize

    83KB

    MD5

    10bca243b4411389a4a7bf8ab25089e6

    SHA1

    0ea7a1892310fc57c5fd4f5f3e0242e01540c661

    SHA256

    60d457a4117b74b2d888578c875a1f67edfd374589bd36004c3b40d3e0321413

    SHA512

    d016f64e3c68f0d9bd8e1344fb735bc5ee5dead601dc4f1f095ef488e04d2ddaa33aaa44da7b023b0b5671f9f48048b7dcb85b7cc6df7dcd549767dd386141d5

  • memory/1444-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1444-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1444-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1444-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1444-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB