Resubmissions

22-08-2024 16:37

240822-t5an3sxclb 8

22-08-2024 16:36

240822-t4ftpszbrp 3

Analysis

  • max time kernel
    45s
  • max time network
    47s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-08-2024 16:36

General

  • Target

    winrar-x32-622es.exe

  • Size

    3.3MB

  • MD5

    84cd0e26bf4ad3e150e80bd10309dc5d

  • SHA1

    42c65db74fa0a13f1e068811201db15b5a312d6e

  • SHA256

    2985c4920ef1aa0bab69e6397b5ce943a53d82a49642dda20d470453275ec7d0

  • SHA512

    7148757c24f1ffc5afc364e6d7ee09b4c100168af2cf4c87057eec8b81e3ae5913f6080afd50404e10c51122f388eae602328c05257277f74a605f8d8e50c900

  • SSDEEP

    98304:qWhrDOBfKBwAf/sLdm5ZjA/nI+mod933b/kWlEXm8:/pULdm5K/I+nb/kWa/

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\winrar-x32-622es.exe
    "C:\Users\Admin\AppData\Local\Temp\winrar-x32-622es.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:5100
  • C:\Windows\SysWOW64\werfault.exe
    werfault.exe /h /shared Global\0e4ddd153fe34768a27c7024dd0a8055 /t 4504 /p 5100
    1⤵
      PID:1572

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads