Analysis

  • max time kernel
    14s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 13:25

General

  • Target

    5ae47ebd350bb3a6947ebf0ea31592d0N.exe

  • Size

    166KB

  • MD5

    5ae47ebd350bb3a6947ebf0ea31592d0

  • SHA1

    f718571ec54ae9a45e12a3201d95b474216b70a0

  • SHA256

    3bd4e3ab5640d00199800f49e84a9562958a4dc3cc7eb459f8dd9e7ad9ba4058

  • SHA512

    1af01f20b14f4f76299a421eaec1a127016aa286468c6719f14ce63b45a03d5cc3c4d9dab75aa5dedc6a0498449d96983fb486388d4d6fb9313586bbe4f540b0

  • SSDEEP

    3072:62ssWpGgrM+t58qKcAK+j4n7ByeFUB6W2QZwKS7j:MVwgrM0MeFUt2ZKS7j

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ae47ebd350bb3a6947ebf0ea31592d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\5ae47ebd350bb3a6947ebf0ea31592d0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads