Analysis

  • max time kernel
    140s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2024, 10:32

General

  • Target

    de2bce02d863f83f932e1481931e0377959855ad1b31399dd5227aee02a72820.exe

  • Size

    1.3MB

  • MD5

    7815f97f5744864009acaa136a236339

  • SHA1

    f9067f6e0eb665515761d0d125f5ff16305a6d5d

  • SHA256

    de2bce02d863f83f932e1481931e0377959855ad1b31399dd5227aee02a72820

  • SHA512

    febc4f7b8d77266af77ec7cc5058d24982b1d82bf8c82c8f130b04452740e598a8ff1b38865ccc8f7a48ebd1fa851f54406f2830f46d53a0964e285282400585

  • SSDEEP

    24576:OYwtHA5MTZEX4+BzDu0qqq3wik7+1YtGVhCkVF41pHZiiP/6FSuRAEDZe:dwgpzD4qSRk7+1YtQhRVF4THZZ/YRA8

Score
7/10

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de2bce02d863f83f932e1481931e0377959855ad1b31399dd5227aee02a72820.exe
    "C:\Users\Admin\AppData\Local\Temp\de2bce02d863f83f932e1481931e0377959855ad1b31399dd5227aee02a72820.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2052-0-0x0000000000400000-0x00000000006A2000-memory.dmp

    Filesize

    2.6MB

  • memory/2052-3-0x0000000000400000-0x00000000006A2000-memory.dmp

    Filesize

    2.6MB

  • memory/2052-4-0x0000000000400000-0x00000000006A2000-memory.dmp

    Filesize

    2.6MB

  • memory/2052-5-0x0000000000400000-0x00000000006A2000-memory.dmp

    Filesize

    2.6MB