Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 17:23

General

  • Target

    Orc0611.exe

  • Size

    19KB

  • MD5

    a2ae673749e0d410fa1e4e8ac8507221

  • SHA1

    150025f4a49358bcc2bdb9a8db8adb82e5d40942

  • SHA256

    ed4b60661ed54af57e00fc69b4e4c3337f193d162e895f8acd9422a2a0ca1d27

  • SHA512

    05c748823106ee4ac087b4a29c530f9611386b05dcfdab22f54d73ef1a790243e56a7a1efbe80931a5a5f277f847037665e20d85a10f99fe3abd2191400d668e

  • SSDEEP

    384:D4+fmtkxhDyvQLIQ+nxrvosqc4czJj2audWW:tmGxhOAWnRMlczN2r4

Score
7/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Orc0611.exe
    "C:\Users\Admin\AppData\Local\Temp\Orc0611.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2876-0-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/2876-4-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB