Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 03:13

General

  • Target

    11811f8d362f9757ca8ee41151d1c4b8761f8095c7031b6f417b81fa3b4a71f2.exe

  • Size

    83KB

  • MD5

    84c3232df098dd253a3bcd5ff38d1f83

  • SHA1

    47c15fd811b2a0df7348fe4b8560df86b7d2a37c

  • SHA256

    11811f8d362f9757ca8ee41151d1c4b8761f8095c7031b6f417b81fa3b4a71f2

  • SHA512

    3711e384980470b81994fea9d4ce1034c0e7e970346706ab82e519f488b020415c1b62edd838526fac3b21be61629872b855d091dd86ac1fd0065eed6d338888

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+6Kq:LJ0TAz6Mte4A+aaZx8EnCGVu6l

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\11811f8d362f9757ca8ee41151d1c4b8761f8095c7031b6f417b81fa3b4a71f2.exe
    "C:\Users\Admin\AppData\Local\Temp\11811f8d362f9757ca8ee41151d1c4b8761f8095c7031b6f417b81fa3b4a71f2.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-M81fVE6mUlblZJ5m.exe

    Filesize

    83KB

    MD5

    8013475229af0b2b274ba298e0b5f576

    SHA1

    66a2a26bb682420a3214f56b15d49b40267e3ea0

    SHA256

    a10779374c7f23e60ae97d4116d41bd2f367dccebd576188149b57f7461fccee

    SHA512

    1f9f0b4b12dbee75e0ecededf395beab0c7dcd1a60fcfb89e18f3aaf802917cf5b9da274d25cf8f04409d5d446a4d8cae77ec812746950fb9ae1a6b7025b36d8

  • memory/2356-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2356-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2356-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2356-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2356-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB