Analysis

  • max time kernel
    111s
  • max time network
    96s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2024 08:50

General

  • Target

    46e4d9c61644235388518a6889652c3eb18feec21ebdb55642d242327eb3e8f0.exe

  • Size

    83KB

  • MD5

    890ef64c30e8dde2c23f656a38659e72

  • SHA1

    18035135d15b4712a6e37c0389a34ad40e85a95b

  • SHA256

    46e4d9c61644235388518a6889652c3eb18feec21ebdb55642d242327eb3e8f0

  • SHA512

    82e12962f98bcab7f6dd758a9b7ab1cf7660433043f703c10b6a7023ba1d5a1d26a767cda81689c11e0d1997e27b6fbe9a7c81dd84e945f6f32304aec2bd2cef

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+hKe:LJ0TAz6Mte4A+aaZx8EnCGVuhX

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\46e4d9c61644235388518a6889652c3eb18feec21ebdb55642d242327eb3e8f0.exe
    "C:\Users\Admin\AppData\Local\Temp\46e4d9c61644235388518a6889652c3eb18feec21ebdb55642d242327eb3e8f0.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-t36tUbMtj10sjNOJ.exe

    Filesize

    83KB

    MD5

    991c6ab544b48b89ac3d661c05610674

    SHA1

    0e5e58b9f8dc8daeb275c72ebc66ae89616941f4

    SHA256

    943818058235bef33e510fa3803106b048a5afc44966c9195ef9d9556600e1ff

    SHA512

    1ae03d1cc8f2b7316793452c96671739b923534d02b0cebde90c15f298059dd65d96ea493d6ae436bba06b09ef5f933d103ef1aa47ae27c258264049d84afa11

  • memory/2192-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2192-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2192-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2192-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2192-23-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB