Analysis

  • max time kernel
    119s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2025 09:21

General

  • Target

    c603a1cbe9cb5edbba10c1e6c30e31408eebdfb1e55c04c3fff47f5b932743bd.exe

  • Size

    83KB

  • MD5

    65eb72900577df67c5da56efb68c733a

  • SHA1

    d728a56495be30239e532158cb1b48203174f126

  • SHA256

    c603a1cbe9cb5edbba10c1e6c30e31408eebdfb1e55c04c3fff47f5b932743bd

  • SHA512

    6fee1ea296b196b03400d15ee41df0bb42a010dbb775c05b9dc6642588c34535b5a48218c39188fccab1d61a9851029d0c79e86d4c91edecf47093215399f773

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+2K6:LJ0TAz6Mte4A+aaZx8EnCGVu2d

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c603a1cbe9cb5edbba10c1e6c30e31408eebdfb1e55c04c3fff47f5b932743bd.exe
    "C:\Users\Admin\AppData\Local\Temp\c603a1cbe9cb5edbba10c1e6c30e31408eebdfb1e55c04c3fff47f5b932743bd.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-x6cZHGpYX1BU9CyK.exe

    Filesize

    83KB

    MD5

    1dd8eab823fd7338e0f53f94666908d5

    SHA1

    a90f62d8ca5f668fe7db84ca3b1688576f513bef

    SHA256

    8690b337994a7bab75d359ef7b9435970f6f4fab7451e7e115aacd903bb5e292

    SHA512

    c8589255fa4ca9f57cb8d21226aa2a8b40f7ffeadc64a2a2e6261a4226add1da0055a0a70b0c9a9be2c174a454c34c2c069a9994017ade124770f5b0de418c9d

  • memory/1920-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1920-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1920-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1920-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1920-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB