Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-08-2024 21:20

General

  • Target

    042e564e38cfae59057786246f4df010N.exe

  • Size

    101KB

  • MD5

    042e564e38cfae59057786246f4df010

  • SHA1

    2850c68f0f13d32ee33b29410dc42df3486fccd4

  • SHA256

    9fe0a8db1d5c46bfc5c22d41db01cd9510bfda3a0b22325ca51704c179a924d8

  • SHA512

    bcf83592fa380f51bfbb19a5629fcd327ee2afd2295310e16ecb7c174cd9cb335cae1286ddbc5aeb34fd86effa5caa2df98439819103bc1b442975406450499a

  • SSDEEP

    768:jGvbqsQdX5BhGEnOsIzfJ4i4g5p0syi+hvN18K3H8T6++3KI4Fyu8hcLCik5dAyl:CzqsQ5PIt4+/yfeB6r6YcOik5h36lB4F

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\042e564e38cfae59057786246f4df010N.exe
    "C:\Users\Admin\AppData\Local\Temp\042e564e38cfae59057786246f4df010N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\My Downloads\Norton Utilities 2002 XP Key Generator.exe

    Filesize

    101KB

    MD5

    7c5d0c5c54f3c46444c2d5afed6226df

    SHA1

    96beadc91f9d2397ed89d6d5b3409f3f149c7898

    SHA256

    c99cb14d792a2dde83b99395a5ba73dfd732def1a2884875563542714aa457b9

    SHA512

    5db2d7a4e95e05dcd1f341578a50b21aceddc8231cea74847e0eafd83068f4f038b21c1150cdb696ab1514ff06bebd199320ada97f18cba20e6da6da251e945e

  • memory/392-0-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/392-101-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB