Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 23:52 UTC

General

  • Target

    Rack/6a08b51e02a7b510972907c326041222ff4632ba53b89573fca7e80b59c4e168.exe

  • Size

    260KB

  • MD5

    1603aa73ddc1b52002505f49f4680ae0

  • SHA1

    82bea2f53c75ff446723bf2842fa357c3b0fe0ce

  • SHA256

    6a08b51e02a7b510972907c326041222ff4632ba53b89573fca7e80b59c4e168

  • SHA512

    39f49d626c38be26d413570e490998f62d769badacb872dce295657dbbd9cb3690d9324f26b59e377c4be1716ec34d2e3e4f8d3586078432b18b2f3178a34511

  • SSDEEP

    6144:CkMYmk7nSPwZCNnRFujfLRvhgmvH/VCrEfEa:CkMdkDSPlfFurLdfVCPa

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Rack\6a08b51e02a7b510972907c326041222ff4632ba53b89573fca7e80b59c4e168.exe
    "C:\Users\Admin\AppData\Local\Temp\Rack\6a08b51e02a7b510972907c326041222ff4632ba53b89573fca7e80b59c4e168.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Users\Admin\AppData\Local\Temp\Rack\6a08b51e02a7b510972907c326041222ff4632ba53b89573fca7e80b59c4e168.exe
      C:\Users\Admin\AppData\Local\Temp\Rack\6a08b51e02a7b510972907c326041222ff4632ba53b89573fca7e80b59c4e168.exe
      2⤵
        PID:2648

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2648-19-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/2648-1-0x00000000001B0000-0x00000000002AA000-memory.dmp

      Filesize

      1000KB

    • memory/2648-5-0x0000000000400000-0x0000000001400000-memory.dmp

      Filesize

      16.0MB

    • memory/2648-20-0x0000000000401000-0x0000000000421000-memory.dmp

      Filesize

      128KB

    • memory/2648-18-0x0000000000400000-0x0000000001400000-memory.dmp

      Filesize

      16.0MB

    • memory/2648-17-0x0000000000400000-0x0000000001400000-memory.dmp

      Filesize

      16.0MB

    • memory/2648-15-0x0000000000400000-0x0000000001400000-memory.dmp

      Filesize

      16.0MB

    • memory/2648-11-0x0000000000400000-0x0000000001400000-memory.dmp

      Filesize

      16.0MB

    • memory/2648-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2648-10-0x0000000000400000-0x0000000001400000-memory.dmp

      Filesize

      16.0MB

    • memory/2648-8-0x0000000000400000-0x0000000001400000-memory.dmp

      Filesize

      16.0MB

    • memory/2648-4-0x0000000000400000-0x0000000001400000-memory.dmp

      Filesize

      16.0MB

    • memory/2848-0-0x0000000000280000-0x0000000000284000-memory.dmp

      Filesize

      16KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.