Analysis

  • max time kernel
    110s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2024 05:10

General

  • Target

    3fb704362f984894e7831a7e590d8def4889961e9fb86a39572d41727da3406e.exe

  • Size

    83KB

  • MD5

    23618ba669d5cf725afeeb6a6501dae0

  • SHA1

    0c1a0b33125fc1e54b45281bc94165b46ee88dba

  • SHA256

    3fb704362f984894e7831a7e590d8def4889961e9fb86a39572d41727da3406e

  • SHA512

    e8686b9c12f46a9db8e49595a03a08bb508f325d4f1c7498cca0f4cfbe0fbedb28c06825797045c28b4de0872772a11592a5741c90c02f06e68963fcab04c404

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+nKy:LJ0TAz6Mte4A+aaZx8EnCGVunt

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3fb704362f984894e7831a7e590d8def4889961e9fb86a39572d41727da3406e.exe
    "C:\Users\Admin\AppData\Local\Temp\3fb704362f984894e7831a7e590d8def4889961e9fb86a39572d41727da3406e.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-4idakYyDB35P4A3U.exe

    Filesize

    83KB

    MD5

    aaccb003d0b6e454ae8a8769989efea9

    SHA1

    261f93ec5b0b2889f72a5d1b812f5320d0d600d0

    SHA256

    f416fc51036ac35a216fe96b643bfd5576ea1a8a8a804048d9e95946c6953cee

    SHA512

    490a486a125067e57057a27b011b5c4232100bd7e9ae5b10ce9138da12ec5bf7d676d6505dc48ebcf3f92bf70d8efdf61e12eb4d2dfa0fc1a76532b6ca609a59

  • memory/2440-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2440-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2440-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2440-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2440-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB