Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19-08-2024 08:08

General

  • Target

    a44428810ef04d4b02c61714e75d4ae0N.exe

  • Size

    124KB

  • MD5

    a44428810ef04d4b02c61714e75d4ae0

  • SHA1

    2097013065419da041afc6bae95fa634f89d7fbe

  • SHA256

    098c6b75a5264943c4985297d946d69e2c8e5dd02688c25285a30d8dc623155b

  • SHA512

    030324ecfbf6070078f270201998fbfd467c3ce81124b2641bf58e0d72ec9e661a6f40b7dee0a3d5ee5c2c8ea2a12bfbe90fc008c478c2e73f1e17489b47794a

  • SSDEEP

    1536:W7ZNLpApCZrt8PWGoPWGANdN+hEwHwDvZvapBpYYx2UaERT+G9v/0:6NLWpCZIzjwHwMaiFR0

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a44428810ef04d4b02c61714e75d4ae0N.exe
    "C:\Users\Admin\AppData\Local\Temp\a44428810ef04d4b02c61714e75d4ae0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads