Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/11/2024, 05:15

General

  • Target

    49796872e4d54b6ab3440dfd71b97e33c55b73a8bf63a9a79ce6fe77729da0ecN.exe

  • Size

    83KB

  • MD5

    451dd4a652a8deea5f5d2d03162f7a80

  • SHA1

    c3c411e4b4c7bd6e118e436d25669f00e9ab3645

  • SHA256

    49796872e4d54b6ab3440dfd71b97e33c55b73a8bf63a9a79ce6fe77729da0ec

  • SHA512

    b227790b11f53a2e0c75fe93481cab1a1e0e3efbfdf87584a783041c6beba85d53ed18a10fa94fa5c818a2635d98c231baaa1fb79f8b27cdc9be08c2844a4f78

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+kK+:LJ0TAz6Mte4A+aaZx8EnCGVukH

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\49796872e4d54b6ab3440dfd71b97e33c55b73a8bf63a9a79ce6fe77729da0ecN.exe
    "C:\Users\Admin\AppData\Local\Temp\49796872e4d54b6ab3440dfd71b97e33c55b73a8bf63a9a79ce6fe77729da0ecN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2656

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-E6Jc1Q5U5Q6ZcF9G.exe

          Filesize

          83KB

          MD5

          6f5afdd3c393ad2ce2fac147d48d1ae6

          SHA1

          9b004565846a4c6af194b8be3c3e11ee93f95f0e

          SHA256

          d2113a96f63efba38a68235abb846af329886bd52f0292be473427ea605bc7dd

          SHA512

          465b2a8d95ec3ab8f12acd25859dd9bd5d1aa8db9005b845bf1a0852651034f9a8a2335564ddc395389087dca4eb4c08c64d6e7c3cab46c511e0c7970fd18e1a

        • memory/2656-0-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2656-1-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2656-6-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2656-14-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2656-22-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB