Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2025 09:19

General

  • Target

    7cb2c649209a6319dfe2ea110fc38b65c0593423dcb5ba968cf827871f6fb1cf.exe

  • Size

    83KB

  • MD5

    4c4317f602b76780161f14f89503778a

  • SHA1

    55af2c456b27983b2445052adb22f841c54f0e32

  • SHA256

    7cb2c649209a6319dfe2ea110fc38b65c0593423dcb5ba968cf827871f6fb1cf

  • SHA512

    667edc910d2a37955d56586ff4cf9f38c729ffc923d18f767cd325b7c4b3fb9124d338a4a2c1cae6141ed256d09a54a5e742da967226cdedd31966b1caea18ef

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+VKO:LJ0TAz6Mte4A+aaZx8EnCGVuVP

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7cb2c649209a6319dfe2ea110fc38b65c0593423dcb5ba968cf827871f6fb1cf.exe
    "C:\Users\Admin\AppData\Local\Temp\7cb2c649209a6319dfe2ea110fc38b65c0593423dcb5ba968cf827871f6fb1cf.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-0hcilYf81NJnZjEJ.exe

    Filesize

    83KB

    MD5

    b366966247d4c5b82e419afc403e62af

    SHA1

    94d4e3136030b0d78b7fda5300910b1e354062f4

    SHA256

    a9671ceb74b1a4eb820d6bd910fdc764988cbd352122f3c874831a69cc989410

    SHA512

    fd7978c41706d5ff57f2f16180c465481c2141ca904117411222388819af80a7e9a5b86f1bdc97740555adaa1639b0da7725bf16a75b9b615f84f8142c377df5

  • memory/2148-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2148-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2148-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2148-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2148-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB