Analysis

  • max time kernel
    140s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2024, 10:08

General

  • Target

    db91491b3fe7f76be810b8e24331792f1eb299b0a0ef59374877632e0d86c21c.exe

  • Size

    6.1MB

  • MD5

    dd296fd40da09a67a6e2e637e3d811e2

  • SHA1

    137fee9b52d22f08e7685b6f6560b91c350385a4

  • SHA256

    db91491b3fe7f76be810b8e24331792f1eb299b0a0ef59374877632e0d86c21c

  • SHA512

    bf68e0fb7bc6e2ba831e84a4c1c615be2753cead2a7cc5554ec0e3046a0016174b0ce6194e6d28b5909062fc94f9350127dc10ff37cfefe18624518e85f73b5c

  • SSDEEP

    196608:XrLxdmgSGEy58swodZT28mAEcWMg7CYzaGF:b1Qp7swo3TIATbYGGF

Score
5/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db91491b3fe7f76be810b8e24331792f1eb299b0a0ef59374877632e0d86c21c.exe
    "C:\Users\Admin\AppData\Local\Temp\db91491b3fe7f76be810b8e24331792f1eb299b0a0ef59374877632e0d86c21c.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:1632

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1632-0-0x00000000000C0000-0x000000000163B000-memory.dmp

          Filesize

          21.5MB

        • memory/1632-1-0x00000000000C0000-0x000000000163B000-memory.dmp

          Filesize

          21.5MB