Analysis

  • max time kernel
    141s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/08/2024, 15:31

General

  • Target

    1334cde60c767d75e1a12de2e04b8d76fc22c48ce4e07c2ee6451e28eb35b290.exe

  • Size

    13.7MB

  • MD5

    7119aff629e2d7c309343599775a07f5

  • SHA1

    f7a1736499c4af1c3bc1d8f565b2e8a84fdcd088

  • SHA256

    1334cde60c767d75e1a12de2e04b8d76fc22c48ce4e07c2ee6451e28eb35b290

  • SHA512

    a750924d6049e2fac10056a71daccd04e599f4660bd3b310213e6eb91cc2fa4f4d060ecc2bca54f2e42f1724e76af1fa65221c55a5989d8d663d84d563d0815e

  • SSDEEP

    393216:ryGLMq8IkAUKE5YNdMbM7Se/APd8rksdP2:mG4AbWYNROe/APdp

Score
7/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1334cde60c767d75e1a12de2e04b8d76fc22c48ce4e07c2ee6451e28eb35b290.exe
    "C:\Users\Admin\AppData\Local\Temp\1334cde60c767d75e1a12de2e04b8d76fc22c48ce4e07c2ee6451e28eb35b290.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:3056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\GPU-Z-v2.sys

    Filesize

    50KB

    MD5

    d4320487bf3021f2f2afcfc43d652a69

    SHA1

    f94503fea3fa7c526a70187444affd7f0e0e8926

    SHA256

    9af0b89c5c54eb66e5a660b61aee7c1a25b1c92e20a310d8b16552abcf90c0b5

    SHA512

    38cbfb45ebfbb95a5bb67060792331fde6ef471e1e98434027d73025a10c8dd071141fe44c268015b73855fda1380c8b6024a08cb4fec6b443ae24d38fdcf6e6

  • memory/3056-7-0x00000000004D0000-0x0000000003161000-memory.dmp

    Filesize

    44.6MB

  • memory/3056-9-0x00000000004D0000-0x0000000003161000-memory.dmp

    Filesize

    44.6MB