Analysis

  • max time kernel
    110s
  • max time network
    94s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2024 01:32

General

  • Target

    8fda660b31b9b746c4e478c26fd155d67f3fa912977a57b498581642c40eec01N.exe

  • Size

    83KB

  • MD5

    64999bbfed5fb82b45cdbd313cc8d0c0

  • SHA1

    c28974be01a29c7d3ea655049f0513904e5f6847

  • SHA256

    8fda660b31b9b746c4e478c26fd155d67f3fa912977a57b498581642c40eec01

  • SHA512

    bdc307c8480378cdd39232bde0e1c88dc41faac4beb6fe4bec3f90f80c0244bcc5c59a6f62a46945cc24fb9c60f3435f909b1946453f9ab75a8a5d511e72f9c5

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+9KK:LJ0TAz6Mte4A+aaZx8EnCGVu9V

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8fda660b31b9b746c4e478c26fd155d67f3fa912977a57b498581642c40eec01N.exe
    "C:\Users\Admin\AppData\Local\Temp\8fda660b31b9b746c4e478c26fd155d67f3fa912977a57b498581642c40eec01N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-U02K0uTwlBdEfhRv.exe

    Filesize

    83KB

    MD5

    c2fc3f751a0341339329d9fcac4b5802

    SHA1

    c840216dd3c5af7cf222adcc6b1647a5803bcf60

    SHA256

    a8f0390e8348601a5e7b6c86e36992d69947f5acd402a69e4ebd6478be7a4eb9

    SHA512

    b8f869b2f75ecec2a349cb274f5cf587d683468b29fd96418d77d014e32d6c544adca8db450f94d4032d33b7bf0ae5aae11e3d3b032d1060ed29987bddfada5b

  • memory/3056-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3056-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3056-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3056-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3056-23-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB