Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 08:57

General

  • Target

    fccf6aa6b4e66d16bf41ac4af93d30a493e7c1e92ec4705eac0f835d4b3989b1.exe

  • Size

    7.2MB

  • MD5

    15a17aeeda7bbc34fbdd1776eba28c9d

  • SHA1

    11a6cec3404f7a7bed14f0ee38a4c3c4605703c3

  • SHA256

    fccf6aa6b4e66d16bf41ac4af93d30a493e7c1e92ec4705eac0f835d4b3989b1

  • SHA512

    9af7bdefa8c9c073831283f188bfaa2a3f7c8e7856983e09eb6c0752945b99790f563e1230193a9b253703808fda3c4b0510a5b05b8980b0c1f22d8bae09ebe0

  • SSDEEP

    49152:wsfU4xVKdLxE/lB/fOROMbIGXYHn8jaLaM8nRF7BcnLUsXPRTFwCDTQnor2HMnfB:9xVKdLxA/fYDbIGGn8jaLLPwrynrw2

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • UPX packed file 27 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fccf6aa6b4e66d16bf41ac4af93d30a493e7c1e92ec4705eac0f835d4b3989b1.exe
    "C:\Users\Admin\AppData\Local\Temp\fccf6aa6b4e66d16bf41ac4af93d30a493e7c1e92ec4705eac0f835d4b3989b1.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1716

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\CGtoolsConfig.ini

          Filesize

          12KB

          MD5

          2997637ca34285e3f7945ffc4fd734b5

          SHA1

          a1ca318f902785de9ba025a6b361fc53537416da

          SHA256

          1ce7fcf5655a2e214204d3aaad69a9f87c7fc98b4b0164ef360d29d4f85212b4

          SHA512

          562489694636c0af446613c8a2a5126b66619b22143842f05a12cb479c2d8d9b1cf68ae1d4a5053222388a30bb48742fdbbafe8732aa28babf73cec8708502c5

        • \Users\Admin\AppData\Local\Temp\iext1.fnr.bbs.125.la

          Filesize

          728KB

          MD5

          006d175e480403666095f4077a7b4260

          SHA1

          8a13d09ab170fd3e04edba33c16f6a91d91fce82

          SHA256

          0af365b5db119b2f43d72cb75f3f0302bbaa3a05ef61ef71c256c231713be5dd

          SHA512

          5a31a7a8e147752982075b76c6e64edec28c245255f8f0cf3d1ad76436619a32b448c19194a4e74bed92fb1f65da59dbc8383e004755d42830fc68de63b702c6

        • memory/1716-35-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1716-6-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1716-55-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1716-54-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1716-53-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1716-52-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1716-49-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1716-47-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1716-45-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1716-42-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1716-39-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1716-28-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1716-30-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1716-4-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1716-37-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1716-24-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1716-23-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1716-21-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1716-19-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1716-15-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1716-13-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1716-11-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1716-9-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1716-7-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1716-32-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1716-5-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1716-130-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB