Analysis

  • max time kernel
    67s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/01/2025, 17:00 UTC

General

  • Target

    e401eef8c37a2118d1f6e0ee54c279d8b59e558cfffeb4edb31a6a30adc8a7d1N.exe

  • Size

    130KB

  • MD5

    a0cb0bf7fb60c093e44f019653d7d550

  • SHA1

    513d361eff25d3136d8b44bd859b6a4107bf0a27

  • SHA256

    e401eef8c37a2118d1f6e0ee54c279d8b59e558cfffeb4edb31a6a30adc8a7d1

  • SHA512

    d2f20f13655ef6e08c8a4d251f106f118b727a745aa5796e43515da20ffcb7a7d71b96ccf188406d7e60f76edea71f75f1f0a91ab594e942f080cfe4af02dd98

  • SSDEEP

    1536:eH1ZaQvR1KiX3NK6I+hZhYrt/w5Q6G6IpiRYzz9qJHhhnm0yG5aP/5UROXTmZy:SKQJcinxphkG5Q6GdpIOkJHhKRyOXKk

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e401eef8c37a2118d1f6e0ee54c279d8b59e558cfffeb4edb31a6a30adc8a7d1N.exe
    "C:\Users\Admin\AppData\Local\Temp\e401eef8c37a2118d1f6e0ee54c279d8b59e558cfffeb4edb31a6a30adc8a7d1N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:1948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1948-0-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1948-9-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB

  • memory/1948-11-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB

  • memory/1948-3-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/1948-53-0x0000000000416000-0x0000000000417000-memory.dmp

    Filesize

    4KB

  • memory/1948-51-0x0000000000460000-0x0000000000461000-memory.dmp

    Filesize

    4KB

  • memory/1948-41-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/1948-21-0x0000000000370000-0x0000000000371000-memory.dmp

    Filesize

    4KB

  • memory/1948-98-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1948-77-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.