Analysis

  • max time kernel
    110s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2024, 16:01

General

  • Target

    872b1a6f14f75779a10d39d8d24421d192604209c2ed6e2736f883db9b260048N.exe

  • Size

    6.6MB

  • MD5

    4629730a574049ac9fa365d974370000

  • SHA1

    8d0d7b7dbd60775459ea6bc2cccc84c30b3785b4

  • SHA256

    872b1a6f14f75779a10d39d8d24421d192604209c2ed6e2736f883db9b260048

  • SHA512

    85cea6a78ded5f61823a759b6f91926370def62d8820e7672b644a0ffaf359de682e540c57fb8362b5ae10f2d63622791b6e0a3eae80a0c13b469d74010cf6df

  • SSDEEP

    98304:FqGD0xVJuM3+VilzcHR21nMO+CFSkW8nktKMqIFfKukiAxI5zSs+TTijkNxbN0Q:FqBWx6PSAnklgK5zSs+TTEIR0

Score
5/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\872b1a6f14f75779a10d39d8d24421d192604209c2ed6e2736f883db9b260048N.exe
    "C:\Users\Admin\AppData\Local\Temp\872b1a6f14f75779a10d39d8d24421d192604209c2ed6e2736f883db9b260048N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2992

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2992-0-0x0000000000400000-0x000000000118A000-memory.dmp

          Filesize

          13.5MB

        • memory/2992-11-0x0000000000400000-0x000000000118A000-memory.dmp

          Filesize

          13.5MB