Analysis

  • max time kernel
    141s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    31-01-2025 18:47

General

  • Target

    virussign.com_ecc04a1ce003b4a5edb12825179f3a61.exe

  • Size

    83KB

  • MD5

    ecc04a1ce003b4a5edb12825179f3a61

  • SHA1

    23f2a98442ae9052c27df0b15a61c2fd2b02d402

  • SHA256

    32b649b2719a9bef61cfa95b7306ad8a4de55df04bb2100b052e51b6720c867a

  • SHA512

    73bf47d32b61a6b41fbe82a6cbeecece9a65f25fe1b5d9d9bbdee8adc3d9541e7a3587075474f0d7064f48ae63669a62d599f1cd4ab045300d29fd3f1cfe2370

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+0K+:LJ0TAz6Mte4A+aaZx8EnCGVu0n

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\virussign.com_ecc04a1ce003b4a5edb12825179f3a61.exe
    "C:\Users\Admin\AppData\Local\Temp\virussign.com_ecc04a1ce003b4a5edb12825179f3a61.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-3M4JivVuDyPtB8we.exe

    Filesize

    83KB

    MD5

    7a704d1b736823564c140755075b8905

    SHA1

    a2a881833784b7f57eb0373a5e8eee1ba7d328e6

    SHA256

    0c018f0f09bca2acfec41558bb12e5566d0842163c453abce2b9d2dbd90d863c

    SHA512

    3146725946b0ac07d39c7289caeded146da175e46a6f18013a360931581e0e82216e5bb4576610b05a6f13e78bad4c52f00a4ae2daca856fb5c8e9b739702037

  • memory/2380-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2380-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2380-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2380-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2380-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2380-29-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB