Analysis

  • max time kernel
    110s
  • max time network
    93s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2024 09:13

General

  • Target

    70315c2f9be7a76a87cc4157cc6c291fed4a1598aa886e1aba5d16ae90f43755N.exe

  • Size

    83KB

  • MD5

    fc230c51828fd7d42bcd932b68892a60

  • SHA1

    7c470626261855483fbf116ff88b754407ca89c1

  • SHA256

    70315c2f9be7a76a87cc4157cc6c291fed4a1598aa886e1aba5d16ae90f43755

  • SHA512

    2a08cfed50313a6bd4b2543aa752adf4354a535a0c5b55195be225895860d649021b64147b20ec474d02e61acc242ce9a50009ceefcca4623347e30553a5b00f

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+hKu:LJ0TAz6Mte4A+aaZx8EnCGVuh/

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\70315c2f9be7a76a87cc4157cc6c291fed4a1598aa886e1aba5d16ae90f43755N.exe
    "C:\Users\Admin\AppData\Local\Temp\70315c2f9be7a76a87cc4157cc6c291fed4a1598aa886e1aba5d16ae90f43755N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-wvUR62HCrAN67ZSx.exe

    Filesize

    83KB

    MD5

    99011bd89ffc8ebac19a7af1ba118748

    SHA1

    99f6ba35adfd62079669b470211838690210a35c

    SHA256

    3e067537bb2bea0ba24d00ffd48f743e5a71f7a38533bb4396f01faabd466427

    SHA512

    a4eef33986d3c0e9fd705b8607b8e9011a3ea66175af0b325abcf6831de6f76a82c0f264b7aaba1faefd8e469588335dbd1f9c2ddb088c82430f6c5e3b16d851

  • memory/2232-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2232-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2232-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2232-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2232-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB