Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23/07/2024, 20:42

General

  • Target

    074e54617e34bd589fdf7c7bd15e0c30N.exe

  • Size

    116KB

  • MD5

    074e54617e34bd589fdf7c7bd15e0c30

  • SHA1

    86ddc989d54d7a24686c5f52a0727546d819ec06

  • SHA256

    48d54a244f8a2df3d9fcb3cd3e7e098a0077912c312a94dd760c7c95a7f97737

  • SHA512

    d857ac5ab9fc2506134a51a5381e3c6fa8976c6d8d9c85e83eaecfeaf84750dc1c0bd0b5a0e5fa496e0a979030c48fe8329bcea2729bab21cd18f4f6baa9e0bd

  • SSDEEP

    3072:6e7WpMaxeb0CYJ97lEYNR73e+eKZOf7fALt:RqKvb0CYJ973e+eKZOf7fALt

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\074e54617e34bd589fdf7c7bd15e0c30N.exe
    "C:\Users\Admin\AppData\Local\Temp\074e54617e34bd589fdf7c7bd15e0c30N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads