Analysis

  • max time kernel
    81s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/09/2024, 23:26

General

  • Target

    cacd69d096a5a5b915215325da55eae0N.exe

  • Size

    484KB

  • MD5

    cacd69d096a5a5b915215325da55eae0

  • SHA1

    83a271d65221df437124cb4b59304ee32792697b

  • SHA256

    b23239b8271a40fabd6fc35041bc9e20ecae8178d2da374d183d1c7b12619fb7

  • SHA512

    adad74d9a8c0f4542e490d39028153925b7f0cbb14f7ef75346097e9640e41353ca80f2975d91ba632f2a098c7de63c39b2faea7c0f1d143e0b2485127dd5f08

  • SSDEEP

    12288:Uciwi0zNCntJbEtiO9+Sui17UsvygalVMdefOy9RybA:jCnoPsogVGmRyM

Score
7/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cacd69d096a5a5b915215325da55eae0N.exe
    "C:\Users\Admin\AppData\Local\Temp\cacd69d096a5a5b915215325da55eae0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2232

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2232-0-0x0000000000400000-0x0000000000545000-memory.dmp

          Filesize

          1.3MB

        • memory/2232-2-0x0000000000400000-0x0000000000545000-memory.dmp

          Filesize

          1.3MB