Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2024 05:11

General

  • Target

    6ba16f244d96c12752b5fa0bb823739da3fb496e378f09591d1eb29aab1987dbN.exe

  • Size

    83KB

  • MD5

    ad58da08f616c165a5f65bb5c708a920

  • SHA1

    ac9f8c559d73f6e5d4411dc5af0b6ef57ad75e03

  • SHA256

    6ba16f244d96c12752b5fa0bb823739da3fb496e378f09591d1eb29aab1987db

  • SHA512

    b1a4324c57c03dbec235a0ec8d085ca12e2446eea56b52f8d7549f599788ed5bddd5509dba435893de5cb1dc9b2fc1bd1d35f9b0ce691af72b3c9caa35375aef

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+zKK:LJ0TAz6Mte4A+aaZx8EnCGVuz1

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ba16f244d96c12752b5fa0bb823739da3fb496e378f09591d1eb29aab1987dbN.exe
    "C:\Users\Admin\AppData\Local\Temp\6ba16f244d96c12752b5fa0bb823739da3fb496e378f09591d1eb29aab1987dbN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-gAyz3AVA0HFvzSoT.exe

    Filesize

    83KB

    MD5

    38ef51d41333c4794d897398cf0b9db7

    SHA1

    cfdd8c2786c4a8dec725fe3b5cd72635d335c720

    SHA256

    623a3d4e7e51a189df5718100afd91f3c9f7ace4a4a35f70b1277c96e02a4f19

    SHA512

    13b293f470ff92f906daa5b037ea07dbbc6476517a9a75dedbe1fdbbcd70c106cfcf84f92b1eef0ce290b97566e7cec274582852167b075ca395755da9e442b5

  • memory/2524-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2524-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2524-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2524-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2524-23-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB