Analysis

  • max time kernel
    110s
  • max time network
    94s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2024 08:54

General

  • Target

    7222120a6703aa1eabb1efafe2a119eb71236d8eaa8e17175dd8fc3e2fea9565.exe

  • Size

    83KB

  • MD5

    c7b3fb8521b36e6ccc188e3d92fbf9dd

  • SHA1

    4efed2bd4f9740d96befd494ba4d85901bd2d8dd

  • SHA256

    7222120a6703aa1eabb1efafe2a119eb71236d8eaa8e17175dd8fc3e2fea9565

  • SHA512

    ca4bf5bb4a74e3c499acb610db715045175643b4affc809e5a5847958cdaab8be7eafab4d76305e5ac34078937fb54875e1c8e8760ff583ded42063dbeb91612

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+2Ka:LJ0TAz6Mte4A+aaZx8EnCGVu2t

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7222120a6703aa1eabb1efafe2a119eb71236d8eaa8e17175dd8fc3e2fea9565.exe
    "C:\Users\Admin\AppData\Local\Temp\7222120a6703aa1eabb1efafe2a119eb71236d8eaa8e17175dd8fc3e2fea9565.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-p8YyRgsECQoLX6kW.exe

    Filesize

    83KB

    MD5

    1be953c4d889da30e81313cc3b165275

    SHA1

    84165101c1f3825831420699c8c515ea1a7e6d2a

    SHA256

    2991c32baa578cad3ec2d9d6998968439dec2bdd369174869a0d48627bd934bd

    SHA512

    1f90514527942cf1541bc39219b50d2f53e1d67e84ea4a6970e597453363a83f98b909767a4654b052c490f54190a0ed01c6132d2b493157e608dd2321b382db

  • memory/1964-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1964-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1964-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1964-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1964-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB