Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2024, 08:46

General

  • Target

    daf5de655ff94d19ec32a291a09aee0313052ab006a8f512e04ea8e3eb7643e1N.exe

  • Size

    83KB

  • MD5

    ce0c98c0c6bf931d2f140ff3f733cf30

  • SHA1

    3e9fc035147fcce84de79adf19ec09479bb08b3b

  • SHA256

    daf5de655ff94d19ec32a291a09aee0313052ab006a8f512e04ea8e3eb7643e1

  • SHA512

    2935d245e45a75865ef7b1a59a7bedc5f65d9b92154a6c65a753abdfbe5029e64e19247cf1955278e83bdd061610dd14b11cba85e1c38be4efceba98cbe2b5e0

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+HK:LJ0TAz6Mte4A+aaZx8EnCGVuH

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\daf5de655ff94d19ec32a291a09aee0313052ab006a8f512e04ea8e3eb7643e1N.exe
    "C:\Users\Admin\AppData\Local\Temp\daf5de655ff94d19ec32a291a09aee0313052ab006a8f512e04ea8e3eb7643e1N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-iBQYMd2HXjtTSEsm.exe

    Filesize

    83KB

    MD5

    756c3224c57be7541db71fe78c4848c7

    SHA1

    7001c6126fa2e888a4b7fae103ce2f9160ae4459

    SHA256

    fe1d99b5bdfee568976adbe9f5f1acf7a1ef4cddf3df98c43590b52367318809

    SHA512

    bc0eb23625434b15217d69a78658195be47174f7c5f1b692ffa85506c07f9886ea1a2c2562ce723023185dc68a3d2ba5581169b16de32c0a8b1dafc29246fe74

  • memory/3024-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3024-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3024-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3024-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3024-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB