Analysis

  • max time kernel
    94s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/09/2024, 18:52

General

  • Target

    oggenc.exe

  • Size

    185KB

  • MD5

    177e1eeeb7fff52b142f96812ac4c6a6

  • SHA1

    7f36277c2f89ee1c3d2f46ea892541b143980a0b

  • SHA256

    0a15a3435a74dd205ffb9ebac918209a82346f8f9366fa60f46605293a61459d

  • SHA512

    1d5ed5b979b014fe1f13f9d9f16100c859fc31a0cfc973048078c9b67084d40daa76c2a1c3e222df6ba9b4d54d8805f3a055d184d70dc05da6b544623ea008a6

  • SSDEEP

    3072:7R2pBumUsGtlsKGlCPXE20xuapRYB2ieDO9X2tVnPwNlPdJtmf9VOKTExhH0awuQ:12vXUsGL7GlCPXEWcGIieD42tVnPwLlw

Score
7/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\oggenc.exe
    "C:\Users\Admin\AppData\Local\Temp\oggenc.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1636

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1636-0-0x0000000000400000-0x000000000052C000-memory.dmp

          Filesize

          1.2MB

        • memory/1636-2-0x0000000000400000-0x000000000052C000-memory.dmp

          Filesize

          1.2MB