Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 02:28

General

  • Target

    a1afc7baa60815e0146d0c59adba5d84588eea6e690eefa3e076492041c05943N.exe

  • Size

    83KB

  • MD5

    a69fba4b864eda9e83916804bd5a9150

  • SHA1

    c8fd6ec30f3b5c9178fd3df8bfca9de0e29770c6

  • SHA256

    a1afc7baa60815e0146d0c59adba5d84588eea6e690eefa3e076492041c05943

  • SHA512

    d2c7b582a3f59cb89df364da3800fe5a42db23f3f5f6d8f248a0970c447be108cf352c21987f6937808a8566f11de9aa7e545af542d70938a780b913b6fc4752

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+NK:LJ0TAz6Mte4A+aaZx8EnCGVuN

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1afc7baa60815e0146d0c59adba5d84588eea6e690eefa3e076492041c05943N.exe
    "C:\Users\Admin\AppData\Local\Temp\a1afc7baa60815e0146d0c59adba5d84588eea6e690eefa3e076492041c05943N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-EdGXDp4z4WaMAQqD.exe

    Filesize

    83KB

    MD5

    72017a1ff6abd1c691c1da33ffaff147

    SHA1

    e5c1d3641dd796b17e064b4674089fc98a9ded47

    SHA256

    973fd2bb150daaaf480f24091cafb3d88c9acfbaf41eef17b58c8afe5f1b7501

    SHA512

    ecf12791e771f601c594db16b91f20d9f0f7fc706b5413203f2f925c3b0b50b53db9ebe563736c4e14df72b3b9b9568bcef8cb685325eb7083184bf2f3e3f15b

  • memory/2160-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2160-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2160-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2160-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2160-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB