Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/11/2024, 05:16

General

  • Target

    e860058015d391295f97995127a04b68631b9cbb23fa8e8f9472974e28228e07.exe

  • Size

    83KB

  • MD5

    03654d64594d1de702cd2c753b91a2d6

  • SHA1

    2a45d5121341ffc5a1d3d551049cda87dd7da7cb

  • SHA256

    e860058015d391295f97995127a04b68631b9cbb23fa8e8f9472974e28228e07

  • SHA512

    05fc54a62ef0f022207a925d7722be6bb587a39728136b3edef9d188acc635ff0a91cd71b5849b5ebc3f9a370782ab855cc15118446bc81e95b70e62561cc6fa

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+uKq:LJ0TAz6Mte4A+aaZx8EnCGVuuF

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e860058015d391295f97995127a04b68631b9cbb23fa8e8f9472974e28228e07.exe
    "C:\Users\Admin\AppData\Local\Temp\e860058015d391295f97995127a04b68631b9cbb23fa8e8f9472974e28228e07.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1800

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-BWnpR9tSwEIMyuTl.exe

          Filesize

          83KB

          MD5

          866152657eb958dd9d50dfaad58699f6

          SHA1

          3eb25223bafbf22ffcc2451987db9d5ec4df1a91

          SHA256

          9d81043940a935aa58133b10fe2bbf65024af6882a61bb33d42ef86d00731daf

          SHA512

          0539dc21675b8593f9e25321c7d8f155a42da9c6410ddcf54959d001823f4602144d50e4e77d1a1e327390d59fdafc1c7a170a1816b0931993fc20fb217a19f3

        • memory/1800-0-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1800-1-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1800-6-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1800-14-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1800-22-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB