Analysis

  • max time kernel
    24s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02-08-2024 11:02

General

  • Target

    Carpetas de Archivos/X360CE - 32 Bits/x360ce.exe

  • Size

    2.8MB

  • MD5

    04ae76f89c99b8a225771f3702b1c858

  • SHA1

    aff34cd0c77243e54b57ed2a55213159effb1f0e

  • SHA256

    f54deb01f98614fd94eb2954e0c909b2518370d4286767cd265f77f6588bff9b

  • SHA512

    985dad2372edf283e5c8068ee5c315b0e31f03bfe909a773cab31ceb1064308148f299008db488984853ca46fafdfe15abd1b2624ead8942425eb027737869e9

  • SSDEEP

    49152:ol7PbfJJb4/WGhvbBJJb4/WGmJJb4/WGi0wr+CTZtvwZOP7UCqEJJK4//Gz:oVPXbbGNRbbGubbGiBr+AK+Gz

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Carpetas de Archivos\X360CE - 32 Bits\x360ce.exe
    "C:\Users\Admin\AppData\Local\Temp\Carpetas de Archivos\X360CE - 32 Bits\x360ce.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2972

Network

MITRE ATT&CK Matrix ATT&CK v13

Discovery

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\X360CE\x360ce.gdb
    Filesize

    19KB

    MD5

    9edc6b74c12d6432c3c945764a38ece1

    SHA1

    e63c210fd6bb7d53a647ce215fcbf724ae739ed2

    SHA256

    b7bc141ba4f3a0a04e1621effbcb06176acd05b1ec8ba7d4dd8b37784eba537c

    SHA512

    8df63ee203532e63bcc05abd2e31b6d586ff959bdfbcac2346cc2101afb69010796ddca65de7054ad2fa34fe1718cc4a6f735fddc29d15e961ba075f2ba4a91f

  • memory/2972-0-0x000000007472E000-0x000000007472F000-memory.dmp
    Filesize

    4KB

  • memory/2972-1-0x00000000010C0000-0x0000000001394000-memory.dmp
    Filesize

    2.8MB

  • memory/2972-2-0x00000000005F0000-0x000000000061C000-memory.dmp
    Filesize

    176KB

  • memory/2972-3-0x0000000000F10000-0x0000000000F9E000-memory.dmp
    Filesize

    568KB

  • memory/2972-4-0x0000000074720000-0x0000000074E0E000-memory.dmp
    Filesize

    6.9MB

  • memory/2972-5-0x0000000004C10000-0x0000000004C4C000-memory.dmp
    Filesize

    240KB

  • memory/2972-948-0x0000000074720000-0x0000000074E0E000-memory.dmp
    Filesize

    6.9MB

  • memory/2972-949-0x000000007472E000-0x000000007472F000-memory.dmp
    Filesize

    4KB

  • memory/2972-950-0x0000000074720000-0x0000000074E0E000-memory.dmp
    Filesize

    6.9MB

  • memory/2972-951-0x0000000074720000-0x0000000074E0E000-memory.dmp
    Filesize

    6.9MB