Analysis

  • max time kernel
    16s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 06:54

General

  • Target

    9712fe422a26d74e0ad276b38f1417a0N.exe

  • Size

    141KB

  • MD5

    9712fe422a26d74e0ad276b38f1417a0

  • SHA1

    ae4242f822d298e916a4f2981304f788815988b8

  • SHA256

    70472e37e10034b6757db17f54f7d21b6bb06156ccbe08035eac8dcd015b3db3

  • SHA512

    5ad7ab03ce13c250bca16e7cbc82f9f44a3aa3423b8e03140c1aa68dbbc514d74db7781fcc05cc0b68e58dad1454b97c9dcfe3583ad25c7b2f56250accd883d5

  • SSDEEP

    3072:9QWpze+eJfFpsJOfFpsJ5Dk6W2QZwKS7/:Lpe+ewDk2ZKS7/

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9712fe422a26d74e0ad276b38f1417a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\9712fe422a26d74e0ad276b38f1417a0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2392-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2392-1-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB