Analysis Overview
SHA256
692dac28e9f90f0a492e2abdffd2701db7907a93289330b2532dcc4e2e5105b3
Threat Level: Likely benign
The file 692dac28e9f90f0a492e2abdffd2701db7907a93289330b2532dcc4e2e5105b3N was found to be: Likely benign.
Malicious Activity Summary
Drops file in Windows directory
System Location Discovery: System Language Discovery
Unsigned PE
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-09 22:44
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2024-11-09 22:44
Reported
2024-11-09 22:46
Platform
win10v2004-20241007-en
Max time kernel
16s
Max time network
97s
Command Line
Signatures
Drops file in Windows directory
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\692dac28e9f90f0a492e2abdffd2701db7907a93289330b2532dcc4e2e5105b3N.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\692dac28e9f90f0a492e2abdffd2701db7907a93289330b2532dcc4e2e5105b3N.exe
"C:\Users\Admin\AppData\Local\Temp\692dac28e9f90f0a492e2abdffd2701db7907a93289330b2532dcc4e2e5105b3N.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | irc.lcirc.net | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 196.249.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.210.23.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 140.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.163.202.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.42.69.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 48.229.111.52.in-addr.arpa | udp |
Files
C:\Windows\win32dc\Silent Hill 4(crack).exe
| MD5 | 2c7f674cd9abd6410683a68d5fa369b0 |
| SHA1 | 58542377ea6fee2890a9eb71ef6a5a8829b2f5a1 |
| SHA256 | 692dac28e9f90f0a492e2abdffd2701db7907a93289330b2532dcc4e2e5105b3 |
| SHA512 | 249129a14607cb048bfbf4f5cfb61abd619df22ffa9f6f2d2d88d0a2188dee1137ceb1cc1cd412758b9476329ae6a015a217d25309a52690170c9deb3e9ed007 |
memory/4876-15-0x0000000000400000-0x000000000041E000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-09 22:44
Reported
2024-11-09 22:46
Platform
win7-20240903-en
Max time kernel
11s
Max time network
17s
Command Line
Signatures
Drops file in Windows directory
Processes
C:\Users\Admin\AppData\Local\Temp\692dac28e9f90f0a492e2abdffd2701db7907a93289330b2532dcc4e2e5105b3N.exe
"C:\Users\Admin\AppData\Local\Temp\692dac28e9f90f0a492e2abdffd2701db7907a93289330b2532dcc4e2e5105b3N.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | irc.lcirc.net | udp |
Files
C:\Windows\win32dc\UT2004 + nocd.exe
| MD5 | 7ed10fd0940e861040d61748d0d6a2ad |
| SHA1 | ffcdb18cd71bcd1e17cdb51091594646999dd2a2 |
| SHA256 | c1a67985b496eff59e070f16a829883d536212d2b7e0f75126089c604199b60e |
| SHA512 | 17a1cd18b8495285fb5eac3d390aa747d1297d08ca03d0779176b730e680bd2e74f798b0bf00cce80a92bdb7cae912314145823687f0ab49491b5b94db6d42b8 |
memory/876-16-0x0000000000400000-0x000000000041E000-memory.dmp