Analysis

  • max time kernel
    141s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2024, 21:08

General

  • Target

    crack.exe

  • Size

    17KB

  • MD5

    3c7ac5eb91dc0564ec0e834faea96195

  • SHA1

    6e7f1534fef7d2fa1d8307a95eb885254fdded84

  • SHA256

    d94604577257569fbf390097061448a3d723a1550012add543e280f030e8b2d6

  • SHA512

    dc3cb904e43493d35a9e71036e0bbf6516ae9afef986429ae3282c1bf7e263a44fdd33d5be032ddd85f2ca619534fb937ee5448f16b96953ca8c15810a15d797

  • SSDEEP

    384:XkN6gO/4LNgU8hSvOefPDeWLnP6UytNfIlo:U7CCvZfPDeCydtZk

Score
7/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\crack.exe
    "C:\Users\Admin\AppData\Local\Temp\crack.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2332

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2332-0-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/2332-1-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB