Analysis

  • max time kernel
    13s
  • max time network
    21s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19-08-2024 09:42

General

  • Target

    885782f6839b2709affd077777fa647b4bd590dc080e4b63e5558d60b4bce0d2.exe

  • Size

    2.5MB

  • MD5

    412329c850f3de11081831435a850fff

  • SHA1

    cab0b2d0f7e1450a7abd85db033b9c98bf128cf6

  • SHA256

    885782f6839b2709affd077777fa647b4bd590dc080e4b63e5558d60b4bce0d2

  • SHA512

    8fe106741d6db3cbf3764ee28e280212bdcb3fff77e271f0df494348d758fe319f671dfd8f183956518ad7d4a81c9f6108cfaf2fa660d726438d0da8daaa86aa

  • SSDEEP

    49152:Iq//YOIWW90S2I9fo8THGnIcQkzfSplLE83kH3/Iozbh:Iq/BUx9HKap+LHPIg

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\885782f6839b2709affd077777fa647b4bd590dc080e4b63e5558d60b4bce0d2.exe
    "C:\Users\Admin\AppData\Local\Temp\885782f6839b2709affd077777fa647b4bd590dc080e4b63e5558d60b4bce0d2.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:2012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads