Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 03:18

General

  • Target

    c70be4507f5784aa6147eeb2bd4be652ce322a24cade066830ed2b7e77719912.exe

  • Size

    83KB

  • MD5

    a8bfb0a4f9e81ac870b54ab9d2a2e4cc

  • SHA1

    e49ea196129047ce904fcaaa05dd273e783b7b86

  • SHA256

    c70be4507f5784aa6147eeb2bd4be652ce322a24cade066830ed2b7e77719912

  • SHA512

    ab491ff08d53d11a7320932da5c6b289b113bb07a9d3f6be9a614baa7cb1c1790704d7a252405ae96c4b01a3f8cba86f72353dd05ae830ba2a98da17136c10e0

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+QK6:LJ0TAz6Mte4A+aaZx8EnCGVuQd

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c70be4507f5784aa6147eeb2bd4be652ce322a24cade066830ed2b7e77719912.exe
    "C:\Users\Admin\AppData\Local\Temp\c70be4507f5784aa6147eeb2bd4be652ce322a24cade066830ed2b7e77719912.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-yxhX6pYdsCOpMGOd.exe

    Filesize

    83KB

    MD5

    f3672507eeb648d238df9d9d2a189015

    SHA1

    ff45849e9f5c90af1629597accbf49fe03b82ce0

    SHA256

    4a969756c344d7c862724d64b84b95cf77b83b631578a51b73cdc164fe28f2b6

    SHA512

    d322fad3d3c055d084761798cdde66e08dcb6e7fe473d7ed95673f81bed47e79b10f71a273674866bf995dc08c371f98f86abbf7db166a9f5467b934818200a5

  • memory/2324-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2324-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2324-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2324-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2324-23-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB