Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 19:25

General

  • Target

    0bebc4bd74c4ad9aa2d5c9301c3f742a474e826d1334c706df54ff692b8ea27e.exe

  • Size

    83KB

  • MD5

    628c536022bb42c5ea4238fe7edd51df

  • SHA1

    4506fcf3a54a144b94d31d6d53b017264ab1a96b

  • SHA256

    0bebc4bd74c4ad9aa2d5c9301c3f742a474e826d1334c706df54ff692b8ea27e

  • SHA512

    a156d68f94f8188dc81602f80c197d69a09edb5cbd84c347dad346832c47442bb58c8b60207b12d1c7502e066ca72464819fb7df8552a2776f7601cdd9717c4e

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+mKK:LJ0TAz6Mte4A+aaZx8EnCGVumB

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0bebc4bd74c4ad9aa2d5c9301c3f742a474e826d1334c706df54ff692b8ea27e.exe
    "C:\Users\Admin\AppData\Local\Temp\0bebc4bd74c4ad9aa2d5c9301c3f742a474e826d1334c706df54ff692b8ea27e.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-y2vmWtwSEArdTfs1.exe

    Filesize

    83KB

    MD5

    a788014be8ce0dabf26cd89cf5bbf15e

    SHA1

    515ca8ec6b7fc64aad79a9adf9eb6b5755237343

    SHA256

    2a43186702e8b9afa07e4e5400780892b54b53335c774a25f951428d8ffba285

    SHA512

    051b1f7cd341a1790b1a0e26a20ca6a07c78c2a18574c6747c4b57feba8c14b7c51d4fb7f42589c3ef9ee923213618484166a8d1cb6cb618604be5cc2847689b

  • memory/1620-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1620-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1620-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1620-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1620-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1620-29-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB