Analysis

  • max time kernel
    110s
  • max time network
    93s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 19:25

General

  • Target

    20ec5a2c7f919a06351dbc00202c7d2a4c2dd94adebbca963e08df76f105cb4bN.exe

  • Size

    83KB

  • MD5

    f2e18fd2ffac3293fc0e44156ac82c10

  • SHA1

    4df8ba5adacd9feed0d416d1295c61eea6f89d6d

  • SHA256

    20ec5a2c7f919a06351dbc00202c7d2a4c2dd94adebbca963e08df76f105cb4b

  • SHA512

    4e344139da0e71dd38873511d8968083a15e8363e2150828aef8602d35c488ed64ffb17520b1e98ed6c8282cb154b1bb52585e3e7e97bb76f61986667919ad9d

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+MK:LJ0TAz6Mte4A+aaZx8EnCGVuM

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\20ec5a2c7f919a06351dbc00202c7d2a4c2dd94adebbca963e08df76f105cb4bN.exe
    "C:\Users\Admin\AppData\Local\Temp\20ec5a2c7f919a06351dbc00202c7d2a4c2dd94adebbca963e08df76f105cb4bN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-LDi4YGDgGEgbFhVt.exe

    Filesize

    83KB

    MD5

    c903a7d82a1342282b71dab524f1c41a

    SHA1

    347febd627531872e36a81990c417ffe92f1259c

    SHA256

    27414ebfe31d398cfff16520acd8b4f717e9664898610652067d3e4ad9834a73

    SHA512

    5784490d9ca1e832fb5bf58788c0b88a3a321d90fafe3d39d74b26021580509249efe2477c5c399276909d045d7cdc1927cffd5576967457f2ec20ff2032a978

  • memory/2388-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2388-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2388-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2388-11-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2388-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2388-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB