Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2024 05:21

General

  • Target

    b05da7dbc17501e329e2481fcf56e0b6d682c05c1edaa4260a2881717fc6cf26N.exe

  • Size

    83KB

  • MD5

    2d679540d4ad0195ca5d87ef10e75b50

  • SHA1

    c01bd477db98c2b444dfb883e783da5e0c70fdbe

  • SHA256

    b05da7dbc17501e329e2481fcf56e0b6d682c05c1edaa4260a2881717fc6cf26

  • SHA512

    a4ab7797036e78871bb1f9fe72feb05f7a39286d15f00778ec80df1031204dcc3b5e88509e29e1843f085b930278cbc7b424fc0ab8f698ccdfa41988f5c9df1c

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+vKe:LJ0TAz6Mte4A+aaZx8EnCGVuv3

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b05da7dbc17501e329e2481fcf56e0b6d682c05c1edaa4260a2881717fc6cf26N.exe
    "C:\Users\Admin\AppData\Local\Temp\b05da7dbc17501e329e2481fcf56e0b6d682c05c1edaa4260a2881717fc6cf26N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:328

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-X9kRzif5RJteE2qh.exe

    Filesize

    83KB

    MD5

    91e67fd6fcfdd1bef1eaa2a81040ee5d

    SHA1

    e8fb4d38ec8ba07a2334f6a1d483339d41a7ea32

    SHA256

    65a30678463bda023f1d90a144d81b8683d8edd4aa4aba6241f2a151d7d31b18

    SHA512

    cf74cf836ecdd4610f1235cbcefd4c20fb52bdb887b66ab87e2f2cc2d7abecd56786fb03fc99c80284fb59783772a9adb690a2951bcaa631249d42e9097be537

  • memory/328-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/328-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/328-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/328-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/328-23-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB