Analysis

  • max time kernel
    111s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2024 08:54

General

  • Target

    7222120a6703aa1eabb1efafe2a119eb71236d8eaa8e17175dd8fc3e2fea9565.exe

  • Size

    83KB

  • MD5

    c7b3fb8521b36e6ccc188e3d92fbf9dd

  • SHA1

    4efed2bd4f9740d96befd494ba4d85901bd2d8dd

  • SHA256

    7222120a6703aa1eabb1efafe2a119eb71236d8eaa8e17175dd8fc3e2fea9565

  • SHA512

    ca4bf5bb4a74e3c499acb610db715045175643b4affc809e5a5847958cdaab8be7eafab4d76305e5ac34078937fb54875e1c8e8760ff583ded42063dbeb91612

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+2Ka:LJ0TAz6Mte4A+aaZx8EnCGVu2t

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7222120a6703aa1eabb1efafe2a119eb71236d8eaa8e17175dd8fc3e2fea9565.exe
    "C:\Users\Admin\AppData\Local\Temp\7222120a6703aa1eabb1efafe2a119eb71236d8eaa8e17175dd8fc3e2fea9565.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-rxzuIuUKlCrOK9cU.exe

    Filesize

    83KB

    MD5

    8ef804c40443c7edeb8fe3c7da5eda74

    SHA1

    67f1e63aa2bcd70eb18fc6be61225dcb650b0a28

    SHA256

    35b3aed9fe64b836be641f63f2b7b2c6f28466101e8b32199a0777256c871483

    SHA512

    950fba6d234ad13515c28f18f8d4d9346524998d5dfd46a8548132919fc4edd0d30d745b3ba979755b7c5fc08f49949bb7a9cce9a93e2e334f2d53536d20232c

  • memory/2940-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2940-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2940-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2940-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2940-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2940-19-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB