Analysis

  • max time kernel
    138s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/07/2024, 09:25

General

  • Target

    SecuriteInfo.com.HEUR.HackTool.Win32.PixieWPS.gen.5223.20632.exe

  • Size

    154KB

  • MD5

    9f8bd3e97595f7c9e01991cffb2616d4

  • SHA1

    b9a3398d6268e414016b317401f104352394754d

  • SHA256

    b91166d5623d4077003ae8527e9169092994f5c189c8a3820b32e204b4230578

  • SHA512

    e72687b8929f3ed08e8e60e1857753fec9259548fc2c31b765e32e34cbbd8603499d358896414480ee508d10434bdcec6af985272d7153fabcc10f2b08c08857

  • SSDEEP

    3072:j3JKugDTHPUM3OvzoQTGdvnuT9I2i/rA5dlADB1L4gLQ7rnAW7:Yugk1BI2i/r63ADogLQXN

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.HEUR.HackTool.Win32.PixieWPS.gen.5223.20632.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.HEUR.HackTool.Win32.PixieWPS.gen.5223.20632.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads