Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2024, 21:34

General

  • Target

    ico.exe

  • Size

    575KB

  • MD5

    c6d1573b8081152becca1a53352c989c

  • SHA1

    e2ea680cd9a90ac6aaf224f7b32ee5f04cf048df

  • SHA256

    d8bf613df878141881e1aed028ecbc4fc570a96347ebbb0b2d2d9cfa08c3f742

  • SHA512

    1c2d9e177546f6ccaf51a15d73130333256998598a3c0f5f1f4bc6c9bfd93cea54d833b515a61c2b07a17fbd159212b0846bc2279cb1aa539652558bdcc74574

  • SSDEEP

    12288:nhj9twopV84vVcf1pPpz7Eb8HG4e0pRcI1dHTo7848lK:nhj9t5U4WXtLHG4z3c+HTo78VK

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ico.exe
    "C:\Users\Admin\AppData\Local\Temp\ico.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:1860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\E_N4\krnln.fnr

    Filesize

    1.1MB

    MD5

    3fe72f93ab5f24a0ea2d753013a41c4b

    SHA1

    9206cd206c0b2782a2b1ad1d19ace97bae6e491e

    SHA256

    db32e8ea1d91009ca25b79d7e863a08be56632641a7a145326fbfbf0931b6c79

    SHA512

    24ce75304e6b5508d9bbf425a68b1907bc51f30c168dd3b800f34e1f7fc1aee044818848d1fde40e7556af5f16f94ea02d19344bd9ffda1a6d011a624d6f46e9

  • memory/1860-1-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1860-4-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB