Analysis

  • max time kernel
    110s
  • max time network
    93s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2024 09:11

General

  • Target

    422b1240e412a0eda277587eac3ba5fff8c2072f39cb71d90950ef8dbd7713d5.exe

  • Size

    83KB

  • MD5

    b04ccd1757587d7efb5c92fe21e8743f

  • SHA1

    53d02057046ac9fd42ad815ac34c874d89d35e82

  • SHA256

    422b1240e412a0eda277587eac3ba5fff8c2072f39cb71d90950ef8dbd7713d5

  • SHA512

    ed44e8e32c267873c58f07c5e5de7eb8adcc6f76208b4552ec1dc7656db457f2108cb09aeb88880d94c35f6837559361e0db279de5d62266a3f76e39aa9281ab

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+EKt:LJ0TAz6Mte4A+aaZx8EnCGVuEW

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\422b1240e412a0eda277587eac3ba5fff8c2072f39cb71d90950ef8dbd7713d5.exe
    "C:\Users\Admin\AppData\Local\Temp\422b1240e412a0eda277587eac3ba5fff8c2072f39cb71d90950ef8dbd7713d5.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-PKfHIbBLSNbbc1dD.exe

    Filesize

    83KB

    MD5

    da9a4018f337ab4751a962bf06a90c28

    SHA1

    80286bf89c83ad73e2c112875cddccd5e10524cb

    SHA256

    33d39833d3ea950f0a0387f1f457415e0a8cc8050739a10b59e65ea1f1a5a58e

    SHA512

    04768f35f553e93a96b5569bb52c7c29a2f066e8118996233c19b301c7d73f79d4c935bc1a8ab766c37f144a8d92254ae5c8586d9cf540af68587cc989bda5c5

  • memory/2148-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2148-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2148-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2148-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2148-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB