Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-01-2025 06:51

General

  • Target

    d1e9185d3be6f62792ec9ba78b667f96ce50ef835474cd561ae2d633ae12782e.exe

  • Size

    83KB

  • MD5

    18f2a5eb4af8c78d26449fc599a2cb1a

  • SHA1

    066901f212e31b86e861dd8e9145789328401ee7

  • SHA256

    d1e9185d3be6f62792ec9ba78b667f96ce50ef835474cd561ae2d633ae12782e

  • SHA512

    8f1d5aacedac86d62cb281253b8a47221e34ee9282f636c2ddedd4850503567f6131303396ddc030dd0d0a261b6e5711b62a3b2f56530c9a467b3d8094ad596a

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+TKK:LJ0TAz6Mte4A+aaZx8EnCGVuTV

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1e9185d3be6f62792ec9ba78b667f96ce50ef835474cd561ae2d633ae12782e.exe
    "C:\Users\Admin\AppData\Local\Temp\d1e9185d3be6f62792ec9ba78b667f96ce50ef835474cd561ae2d633ae12782e.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-10BtFDNqFVEn2Xgn.exe

    Filesize

    83KB

    MD5

    a1a1ff0b81c1e20ec061f2f8a2e80633

    SHA1

    ebb7d8676749f265a74f04029cdfdf5c8ea9d85f

    SHA256

    6a2ab0a57e5375be838b327b1326a6520eea30d84125bdc19d7c9bb6cc9aa6f0

    SHA512

    620770ee48d194bc7efe74484fe59a6f239cb24476f78865608ae817a6f0768475e9c86a8eb87b68d670845bd9972aaaef647e47d9905384bef5c9ba58e2eadf

  • memory/2900-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2900-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2900-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2900-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2900-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2900-27-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB