Analysis

  • max time kernel
    110s
  • max time network
    110s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 03:22

General

  • Target

    9ff66f3e2030f131e5a48f7658457b40b12860ab3fbdd5717424a815c1be56c1.exe

  • Size

    83KB

  • MD5

    dc4a8e1acce4bc74ef1e5b78281c0c60

  • SHA1

    0149d526c52cba7bf1a4aadc711a18967c09ed02

  • SHA256

    9ff66f3e2030f131e5a48f7658457b40b12860ab3fbdd5717424a815c1be56c1

  • SHA512

    e78c140a9c8d3c14dfe426253c638959936f7cde24ceb38b0988d108c348c0eda66815798050b75bd61df80c3bb3821b0e19afb89486696589e961242e5e2bdf

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+EKO:LJ0TAz6Mte4A+aaZx8EnCGVuEv

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ff66f3e2030f131e5a48f7658457b40b12860ab3fbdd5717424a815c1be56c1.exe
    "C:\Users\Admin\AppData\Local\Temp\9ff66f3e2030f131e5a48f7658457b40b12860ab3fbdd5717424a815c1be56c1.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-EnengCISzuTKZcKK.exe

    Filesize

    83KB

    MD5

    354116e764c587f81c1fc22c86ab9977

    SHA1

    76c76e0e4a92f5f240fb68536188ff0cfe92b62b

    SHA256

    53e5767d29b3ff027dd94971dda5addbf43fc7406bfc29f98027fa07f91fa6bd

    SHA512

    108e6b55d32fdd96c102ab88c7a07aa4dedec4d51e44a685bbd422f6de62176bd8c487b03ba7174258463e45e10c81fa533069ff25ded005d15968175cbaee66

  • memory/1088-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1088-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1088-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1088-16-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1088-23-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB