Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 06:20

General

  • Target

    4ee8b267bac6a5278a34549073589756097611678641720c0eac309210400a5a.exe

  • Size

    82KB

  • MD5

    5525e40b8ee9efd6229a9e0604627a2d

  • SHA1

    faaeb2eb9d52191368f7e11da6ef56352c9625eb

  • SHA256

    4ee8b267bac6a5278a34549073589756097611678641720c0eac309210400a5a

  • SHA512

    68501365b27b258c9733f2d3450c70948e6dc7d45bc10df14cd0b3a243d8933b597445382e7b6f6bb56df89e0886aa40bd9de86991b160fc682f201e293f76af

  • SSDEEP

    1536:BCASobWn7wDRUlybde2ns84eSB6xG2+kkX5LG/MNweqGd5f75z:BCAS+WEwyhe2srMG2340/MNweNd5f7h

Score
7/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ee8b267bac6a5278a34549073589756097611678641720c0eac309210400a5a.exe
    "C:\Users\Admin\AppData\Local\Temp\4ee8b267bac6a5278a34549073589756097611678641720c0eac309210400a5a.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:1260

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Bugreport_error.ini

          Filesize

          107B

          MD5

          f82a92bd3f605cab54b1ef2d0f5d000e

          SHA1

          7712961a37605ea84efcde6f0e5479345a17a367

          SHA256

          424848cfc8f1f2e4ae960061421b614531c1a408bd5d494b32b361edbbfed9a0

          SHA512

          8d219720775d1614ce6540677bb3cd097fe4032c375f5967d82807753b3c2f7d0a2d5a55b1d7fd003c53d3159c5d8af8002fff0180c1127d4da315724e5447a4

        • memory/1260-0-0x0000000000400000-0x0000000000442200-memory.dmp

          Filesize

          264KB

        • memory/1260-13-0x0000000000400000-0x0000000000442200-memory.dmp

          Filesize

          264KB