Analysis

  • max time kernel
    91s
  • max time network
    92s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/08/2024, 19:23

General

  • Target

    c66d6a77560a0a8a3b0de1097b74f7c0N.exe

  • Size

    69KB

  • MD5

    c66d6a77560a0a8a3b0de1097b74f7c0

  • SHA1

    d0eec592a4c7717477c7dfc10ff4ea20d919d1cc

  • SHA256

    9503f6aac276d325aabecb5570fb09026037fa22333163dbf2243d654656580f

  • SHA512

    7a7bbb5ecdedbcf0ea6c1957f017daae868556cfee2771515a7301711df874878310bc9ca514437fc546dab8f59f7c198f0ebd26eb3457f82a7b253b575b6f54

  • SSDEEP

    1536:1JoSST4YsYpWvd5cvWU11m+b8gkIOUlzt9r1I:n1S6jvCJ9QIrb1I

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c66d6a77560a0a8a3b0de1097b74f7c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\c66d6a77560a0a8a3b0de1097b74f7c0N.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    PID:4324
    • C:\Windows\SysWOW64\urcearap.exe
      "C:\Windows\SysWOW64\urcearap.exe"
      2⤵
      • Executes dropped EXE
      PID:5072

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\urcearap.exe

          Filesize

          66KB

          MD5

          9406ae7b4f85a7de3fd5fc5045b391c5

          SHA1

          7325f83a79d5e6005de77a2468ddd357df419d1c

          SHA256

          718a9737962a40f8d9f61e49bd43c767f5fc48b7132166f47ee2f3cfad4202e0

          SHA512

          90677a6c4a4fd510057db042a050cd955901a69c8366125cbeb087aaee9364bf4200c9d5c126a3bc9902055d98958cd80af44408084da55f31e6275f91b4218a

        • memory/4324-0-0x0000000077882000-0x0000000077883000-memory.dmp

          Filesize

          4KB

        • memory/4324-4-0x0000000000400000-0x0000000000403000-memory.dmp

          Filesize

          12KB