Analysis

  • max time kernel
    146s
  • max time network
    160s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    18/11/2023, 15:08

General

  • Target

    X2-2022-PACKAGE/X2-2022/X2-2022-EmvSolutions/CARD FORMAT/jcopenglish.exe

  • Size

    4.9MB

  • MD5

    0828480f98adb533104d42ad42601f80

  • SHA1

    5528665c1e94ec7738174058196d3c818c64241e

  • SHA256

    1ecfd3755eba578108363c0705c6ec205972080739ed0fbd17439f8139ba7e08

  • SHA512

    c8e87296d06a1cc032dbc78828413c6d1636d506e859f8f5545a0164b73d0d32d7ed7b046aa8108dacd8299b6a587733d870fb45d3e03666e75bc45a4bb3bc65

  • SSDEEP

    49152:kSf/2SnB0juFU0dMIiK7eeDlI35dCWk7PrTsTp2DXdbr73PxrMM98ijeGfjAhWFe:XcuF1dXiK7eeU5+M2Frz2WjeGqWFby

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\X2-2022-PACKAGE\X2-2022\X2-2022-EmvSolutions\CARD FORMAT\jcopenglish.exe
    "C:\Users\Admin\AppData\Local\Temp\X2-2022-PACKAGE\X2-2022\X2-2022-EmvSolutions\CARD FORMAT\jcopenglish.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1176-0-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/1176-25-0x0000000000400000-0x0000000000972000-memory.dmp

    Filesize

    5.4MB

  • memory/1176-27-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB