Analysis

  • max time kernel
    140s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-08-2024 15:11

General

  • Target

    32BC.exe

  • Size

    226KB

  • MD5

    7483bf6d696fb7564c7c8b3eef7e2c14

  • SHA1

    3cc78c97d454295f33213ece58ffb3a2361b6cb7

  • SHA256

    66d4104de071028b6e0cd1d1c1421ff89698624dade1cdb1051a0ae28ea1d813

  • SHA512

    dc4b0725e1f7b0bb60345d8c81a3d29aec8b1e1fd18a9da53c5d987d2be5eab46f34bbeb6395029c74881490d111c0bd269df7c86810cbb4bf42222f68744cf5

  • SSDEEP

    6144:EQOCO8L7vglf1VLSpQseBT8UT2NGzrJWCAqHV2ho/w:jOCHXo7LSPe8UCAvHVS

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\32BC.exe
    "C:\Users\Admin\AppData\Local\Temp\32BC.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:4528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\32BITCVT.INI

    Filesize

    64B

    MD5

    6e5e2fab03a613d50e16f23c292b6ccf

    SHA1

    f19370b2ce624496ff61f1cdb8004d9f77763d86

    SHA256

    b9e53bd239a342f678895d0f2840407ba27d4c10a20f7f1bbc6e5aa4b360cbef

    SHA512

    a9922f98d65e7c050527878574217689e7a691acda97c2d96fb2b36c509392cc49e311cf7b623a6f81365f6c7e601d7ce18d66da5e0c2905a8a6f5657531ffed

  • memory/4528-0-0x0000000000400000-0x00000000004AE000-memory.dmp

    Filesize

    696KB

  • memory/4528-133-0x0000000000400000-0x00000000004AE000-memory.dmp

    Filesize

    696KB

  • memory/4528-137-0x0000000000400000-0x00000000004AE000-memory.dmp

    Filesize

    696KB