Analysis

  • max time kernel
    110s
  • max time network
    91s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2024 05:06

General

  • Target

    bf513ba02a3b436fd61b423d54e9c852990280d4df098235e1121be3d5003ee8N.exe

  • Size

    83KB

  • MD5

    a40987956eafd395dc35ad6a14708880

  • SHA1

    132ee1bbf25c83d94453fa0c628fb079170e9cb0

  • SHA256

    bf513ba02a3b436fd61b423d54e9c852990280d4df098235e1121be3d5003ee8

  • SHA512

    79ba7f5fa5a0230dbcf6554a54358a0e75e871110a7dfbde7ef55a614e7355a95f7b57dc55b96552b026375cdd9eb19fd69173d09eef7adc6892685dc48cd623

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+yKu:LJ0TAz6Mte4A+aaZx8EnCGVuy/

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bf513ba02a3b436fd61b423d54e9c852990280d4df098235e1121be3d5003ee8N.exe
    "C:\Users\Admin\AppData\Local\Temp\bf513ba02a3b436fd61b423d54e9c852990280d4df098235e1121be3d5003ee8N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-5aB4e1Fu18HXn9DS.exe

    Filesize

    83KB

    MD5

    05e7ec85699dc4fd0da5dee3765670bf

    SHA1

    b771616bea160a39197dcb5135aa2448d0df06ee

    SHA256

    5c90c3e6a03c8b19915f4aae7feddbcee01e51fb488f772109970b6b60286845

    SHA512

    27ae115fa043bf4ddf2bdb965a9f53a826d8f940858e82fc09c103f29356af91d91fd78adeb0e0a35e1235b53383d72d994f6d2ab4217bf8c0845eb262cd31e3

  • memory/1964-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1964-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1964-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1964-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1964-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB