Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 03:04

General

  • Target

    efe6f273e142f0f914b761bd5082ae14a664953c84d343b78659616dba46ca47N.exe

  • Size

    83KB

  • MD5

    9f73f6968aaa203dea0380c40c5ad6b0

  • SHA1

    b8d6ef8c11ccb55cc78174869fee33dd817f247e

  • SHA256

    efe6f273e142f0f914b761bd5082ae14a664953c84d343b78659616dba46ca47

  • SHA512

    4beed7be57a0f93ce0f8dd6ff1c1d04abb4a7b2a7bd57955825f6cfab83916fd87f04ec00ae23a2e05e420d0d619cefa7591a8200083719df5efafacc47162d8

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+iK6:LJ0TAz6Mte4A+aaZx8EnCGVui9

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\efe6f273e142f0f914b761bd5082ae14a664953c84d343b78659616dba46ca47N.exe
    "C:\Users\Admin\AppData\Local\Temp\efe6f273e142f0f914b761bd5082ae14a664953c84d343b78659616dba46ca47N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-rl4t1Q6rebmuFfLx.exe

    Filesize

    83KB

    MD5

    67fd4d431e8aef5391500eca9ea6a4c1

    SHA1

    e2d683baa2c07bef10ea82bf80cdc9d54347a341

    SHA256

    c3d2efb7e68cdf430def8e9ba9f6a25ef00c6d6d282c24b2f3732588e2297619

    SHA512

    7e21cca9e9600c701b853809440010bd6360c958117a31b5a21fc9be05acbbcbf23f8153a8b753b4bf8ef79999252e04d467c064311dac4e90f112239ff81777

  • memory/2572-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2572-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2572-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2572-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2572-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB