Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/09/2024, 05:54

General

  • Target

    bd714d6b913c7e26bd3d2a2db21e2a93cf1811579b9c51a2cc364183890c5b71.exe

  • Size

    82KB

  • MD5

    65b99ab42dc4158260f55efad069e373

  • SHA1

    90e94a0d3f90430a7c491cf836b5a1a67a5cc992

  • SHA256

    bd714d6b913c7e26bd3d2a2db21e2a93cf1811579b9c51a2cc364183890c5b71

  • SHA512

    9ec3a9cc872f5611f00806297587de3facef8837f7839d6958cfe41ec1d6eebe9e723006ff4f0fb1636da2adc4e1da4e6bf0fdf0e4e7b90953758df07f52cb07

  • SSDEEP

    1536:StKfpKv8hiR00iYW0+iXjCWlxBusmLGohFoZHMNweqGd5f75d:SGhp1xiLlxBusmqoh6HMNweNd5f7L

Score
7/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd714d6b913c7e26bd3d2a2db21e2a93cf1811579b9c51a2cc364183890c5b71.exe
    "C:\Users\Admin\AppData\Local\Temp\bd714d6b913c7e26bd3d2a2db21e2a93cf1811579b9c51a2cc364183890c5b71.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:4660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Bugreport_error.ini

    Filesize

    107B

    MD5

    d5ed2e84d0dbb40425288a8ed448005b

    SHA1

    65eedb94e280ae6c254a1b7393607b8221d63d20

    SHA256

    a7cccf2fa0c60341e807cdcdd274735aea5d08b975925f88170f585f1f7c0bee

    SHA512

    9191900335669c0e9363596e76a0ba60606903996e616130759f21dcd8cec001efc5a035f2a4746518a61b4d57c34cac0e6797ac9a11798aca849b4f26f7bb91

  • memory/4660-0-0x0000000000400000-0x0000000000442200-memory.dmp

    Filesize

    264KB

  • memory/4660-13-0x0000000000400000-0x0000000000442200-memory.dmp

    Filesize

    264KB