Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 15:26

General

  • Target

    410eb15ad13a363ad2cfb11ba1d1d240N.exe

  • Size

    125KB

  • MD5

    410eb15ad13a363ad2cfb11ba1d1d240

  • SHA1

    eb247df1c1460e756886b55409983f9b0352bc42

  • SHA256

    f51047487f4249e1317ea0d196a9613dd639d58ed0e1eee6f0b55a38c663eb6c

  • SHA512

    85b557cc47f3f678ef27afe53355c5f4d5171915018cc24f0aca1edd716cf7afb074ec9f9e500ca2e3aa5382e6234bb3af408815d0b8a584a1f2a7b9063895fa

  • SSDEEP

    1536:W7ZppApBULcfpHLcfpyDUdyGdyjljFEwOxW3o/v7V+v:6pWpBwchcwD1ljKwOgobU

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\410eb15ad13a363ad2cfb11ba1d1d240N.exe
    "C:\Users\Admin\AppData\Local\Temp\410eb15ad13a363ad2cfb11ba1d1d240N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads