Analysis

  • max time kernel
    110s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 03:07

General

  • Target

    26bae1620503f97fe0131ad7b46727d355b4300b26b3e8238477e2bcab09a95c.exe

  • Size

    83KB

  • MD5

    844e83ddcedf82e9c806f583a47d970f

  • SHA1

    da2366a3dc46d0068d3ae79960adaa1ee724c9fb

  • SHA256

    26bae1620503f97fe0131ad7b46727d355b4300b26b3e8238477e2bcab09a95c

  • SHA512

    11199180aba0aa3f5fb12916ccca47f9db9784703fa54c4c3ab0535c970360580e1d0fcf434ce346600d14f4a252691031b4d1c5fe6a517b0073c8abbbbafdbe

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+YKO:LJ0TAz6Mte4A+aaZx8EnCGVuYv

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\26bae1620503f97fe0131ad7b46727d355b4300b26b3e8238477e2bcab09a95c.exe
    "C:\Users\Admin\AppData\Local\Temp\26bae1620503f97fe0131ad7b46727d355b4300b26b3e8238477e2bcab09a95c.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-0UhSwIHyW3C4EP0z.exe

    Filesize

    83KB

    MD5

    71c0249ad9c5f245900f25ec71375344

    SHA1

    6de62fa8a06e6aa3ab02e05142dc4781a48bd159

    SHA256

    692e7c8eca1e9824dc6e0e610b560231516fe9260445306b7824dce3519ea5a1

    SHA512

    1d664d94faeb98ed56ee2b51fae007802dd854ac99ce26f977ad3dbcbe46e1ce14aa8162eb4eedf0243f44cab2a2ea5ba65af11ea959ebd1ca80be08bf2e11ad

  • memory/3044-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3044-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3044-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3044-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3044-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB