Analysis

  • max time kernel
    99s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    11-08-2024 08:46

General

  • Target

    314ea62675263f9e72b81e9e02d1184903753cdd938a071bf6d45b9e38982208.exe

  • Size

    923KB

  • MD5

    f3d8bf428edea7e23d8462bb7b11b38d

  • SHA1

    f76f09f2cbd7d7ebcdc22cbe2690c38c5ec47e70

  • SHA256

    314ea62675263f9e72b81e9e02d1184903753cdd938a071bf6d45b9e38982208

  • SHA512

    d055f214b9699ab6ab4735a0f643a4b119e5519c7cf0714ff6e36969a18e557a922e71eebd586874c1bf0af39fe98d4543f68b2bae9c30ffbb5e004bf4b8cf64

  • SSDEEP

    24576:hzB2mCd+xfIGh2N8Zg/CJSEj+Eon9YNJzQ:hsmCjGh2Nmj+Bn2JU

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 25 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\314ea62675263f9e72b81e9e02d1184903753cdd938a071bf6d45b9e38982208.exe
    "C:\Users\Admin\AppData\Local\Temp\314ea62675263f9e72b81e9e02d1184903753cdd938a071bf6d45b9e38982208.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:1736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1736-0-0x0000000003C30000-0x0000000003C32000-memory.dmp

    Filesize

    8KB