Analysis

  • max time kernel
    110s
  • max time network
    94s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 00:17

General

  • Target

    2a5a8e382979d0aae401136e5159f6951c7035dea5e23c369e4a1ccedadb7fa8.exe

  • Size

    83KB

  • MD5

    af039f6d3aacbe136951e01651593735

  • SHA1

    3f1e19da8398e360ecb4e3eb9c408e5a589f3b0f

  • SHA256

    2a5a8e382979d0aae401136e5159f6951c7035dea5e23c369e4a1ccedadb7fa8

  • SHA512

    ef4f78d3b8c2a7d9cabe0098f3ef3fe51a6a2329d68d6b767b2127f4057df474abd139823d17a2af5757978dfd0fd597a847f0aa418f062c65ec69583aa58f37

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+cK9:LJ0TAz6Mte4A+aaZx8EnCGVucm

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a5a8e382979d0aae401136e5159f6951c7035dea5e23c369e4a1ccedadb7fa8.exe
    "C:\Users\Admin\AppData\Local\Temp\2a5a8e382979d0aae401136e5159f6951c7035dea5e23c369e4a1ccedadb7fa8.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-bDLiPqbFCx0KOGyh.exe

    Filesize

    83KB

    MD5

    f40ca4bbe8a35f25ab8abf6ed5e88452

    SHA1

    24d20669802ee00b570a25b6947a7fabf13e1bef

    SHA256

    42993eb3434e1dbd2392e7bf063dee4d03620f46ecf78c602ad3ea417c8e2abe

    SHA512

    241cfa05ba840a3e1f56e267929e0d172aae9e34f09cc751ebe9adb492d119db4ec94d9499d6f02b56bb2019bfa49a904882987775a921d425197e8df7693e14

  • memory/2872-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2872-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2872-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2872-11-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2872-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2872-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB