Analysis

  • max time kernel
    16s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 17:16

General

  • Target

    7362cf73b4a543c55adbf71b897accf0N.exe

  • Size

    1.4MB

  • MD5

    7362cf73b4a543c55adbf71b897accf0

  • SHA1

    bad1b122c73546cbe193bf0245a77d9c286ab390

  • SHA256

    5bc79786218cea4b8d0d2d1264c89fa287450b8681eff2f58d1075038608ba7d

  • SHA512

    b55d3d63ed4a598b6e38770c22c2a9c55f00d86b285099327936819760e76d7a0b7f9848a1377d0d93c1ba6fedce31f634c4d6ad9bca94173ecf23393984fcc5

  • SSDEEP

    24576:zQ5aILMCfmARvKYYtJh8DXmB4thd9qiYrydnBfRORmTkz+zVWakiKGH:E5aIwC+A8JhP70BfRORmTHcqH

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7362cf73b4a543c55adbf71b897accf0N.exe
    "C:\Users\Admin\AppData\Local\Temp\7362cf73b4a543c55adbf71b897accf0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2692-14-0x00000000003D0000-0x00000000003D1000-memory.dmp

    Filesize

    4KB

  • memory/2692-13-0x00000000003D0000-0x00000000003D1000-memory.dmp

    Filesize

    4KB

  • memory/2692-12-0x00000000003D0000-0x00000000003D1000-memory.dmp

    Filesize

    4KB

  • memory/2692-11-0x00000000003D0000-0x00000000003D1000-memory.dmp

    Filesize

    4KB

  • memory/2692-10-0x00000000003D0000-0x00000000003D1000-memory.dmp

    Filesize

    4KB

  • memory/2692-9-0x00000000003D0000-0x00000000003D1000-memory.dmp

    Filesize

    4KB

  • memory/2692-8-0x00000000003D0000-0x00000000003D1000-memory.dmp

    Filesize

    4KB

  • memory/2692-7-0x00000000003D0000-0x00000000003D1000-memory.dmp

    Filesize

    4KB

  • memory/2692-6-0x00000000003D0000-0x00000000003D1000-memory.dmp

    Filesize

    4KB

  • memory/2692-4-0x00000000003D0000-0x00000000003D1000-memory.dmp

    Filesize

    4KB

  • memory/2692-3-0x00000000003D0000-0x00000000003D1000-memory.dmp

    Filesize

    4KB

  • memory/2692-2-0x00000000003D0000-0x00000000003D1000-memory.dmp

    Filesize

    4KB

  • memory/2692-5-0x00000000003D0000-0x00000000003D1000-memory.dmp

    Filesize

    4KB