Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/08/2024, 09:05

General

  • Target

    WSockExpert.exe

  • Size

    242KB

  • MD5

    9fe073bf0aed9c361dc70d2522657d67

  • SHA1

    587c407628f0a08438e1bb7ed545dc61e82d0d37

  • SHA256

    08fc5b77a78d7b7adaaf85bfdc9d5ef780d42314742f9e7d564386e47c0246d5

  • SHA512

    b62908157a68756064abd63ded44337e8f9b95f6ecce6f96b7358af7b45118876f4a0539aabf641ff78a365330668249e4ebc4e9272cfc76a479d0e01c830e4c

  • SSDEEP

    6144:Mfl2ZcZ/Ea1KXoanu577yV08rmRGeMA3e:MVqa1KYaiXyV0mmRGeMA3

Score
7/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\WSockExpert.exe
    "C:\Users\Admin\AppData\Local\Temp\WSockExpert.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:4276

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4276-0-0x0000000000400000-0x00000000004AF000-memory.dmp

          Filesize

          700KB

        • memory/4276-1-0x0000000000670000-0x0000000000683000-memory.dmp

          Filesize

          76KB

        • memory/4276-2-0x0000000000AF0000-0x0000000000AF1000-memory.dmp

          Filesize

          4KB

        • memory/4276-3-0x0000000000400000-0x00000000004AF000-memory.dmp

          Filesize

          700KB

        • memory/4276-4-0x0000000000670000-0x0000000000683000-memory.dmp

          Filesize

          76KB

        • memory/4276-7-0x0000000000AF0000-0x0000000000AF1000-memory.dmp

          Filesize

          4KB

        • memory/4276-11-0x0000000000670000-0x0000000000683000-memory.dmp

          Filesize

          76KB

        • memory/4276-31-0x0000000000670000-0x0000000000683000-memory.dmp

          Filesize

          76KB