Analysis

  • max time kernel
    111s
  • max time network
    96s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2025 09:22

General

  • Target

    cb5f41c31ec097329945977a580b65b6dedd1442d89623bead13e299b7ac79b9N.exe

  • Size

    83KB

  • MD5

    085ac6dff1de92ad24494b805bc45590

  • SHA1

    2452d65ca73572da62c607c3cebe717a459c598e

  • SHA256

    cb5f41c31ec097329945977a580b65b6dedd1442d89623bead13e299b7ac79b9

  • SHA512

    86a1c46e725b354b3f6659c300c6b90e48e6bb19c10353b2e9155b50a47172cedb10a2d15d45a4993c69249fe451c0d2a6b1eea43c5546449828fea491cfd472

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+NK6:LJ0TAz6Mte4A+aaZx8EnCGVuN9

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb5f41c31ec097329945977a580b65b6dedd1442d89623bead13e299b7ac79b9N.exe
    "C:\Users\Admin\AppData\Local\Temp\cb5f41c31ec097329945977a580b65b6dedd1442d89623bead13e299b7ac79b9N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-Jxp0BXxEdJkjHsRS.exe

    Filesize

    83KB

    MD5

    feab6d95ff33155eb5e9d1878c0b86d6

    SHA1

    8d7c1f0f0fee24bb06ecf74dcb08b6c3745a1e70

    SHA256

    d0c80c0c21204aa3b4c0530cb40d8aa77ba9102b635288e299f3e51f4b0e4078

    SHA512

    1f6f1ba0d0905d4d99e19570172ce35e7bab22183ede18d8d261aa78083980d6b4415df0edfd3023c4cb026e2f6e8f356f55b85aa2a0e792b5686c383913bcf4

  • memory/2280-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2280-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2280-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2280-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2280-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB