Analysis

  • max time kernel
    16s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    03/08/2024, 07:56

General

  • Target

    6f7ffa10067486e17e95a463feea5f80N.exe

  • Size

    704KB

  • MD5

    6f7ffa10067486e17e95a463feea5f80

  • SHA1

    0a65373029f37861f6470591deb3178424a2db22

  • SHA256

    4906bca3c545086c463768fbdb95802bee3cda6f853acd08c2efd1bc0708e045

  • SHA512

    8ba3d5347e979971adbcb8cbd90a59d5e76241fae4f064ef5d8d66d3f608a2d53c597a704e8e2b3fd1d5097a9e96e7184b1f91546c654b4d976e0e7b1f3eaa5c

  • SSDEEP

    6144:PqFF2Ie+efsim2uHrOSOSQW/f14a+5Zlo53SU:iFF2+im2uHKSiflo53SU

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f7ffa10067486e17e95a463feea5f80N.exe
    "C:\Users\Admin\AppData\Local\Temp\6f7ffa10067486e17e95a463feea5f80N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:804

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads