Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20-08-2024 18:37

General

  • Target

    60424e344c92ea1b04bf0399d35fdceac394eaff2ea025ff9fe4b15c569d2e92.exe

  • Size

    15.7MB

  • MD5

    e53924ee67ed251c8e13913b03173ee7

  • SHA1

    6116cd8440d15c15dbe2c444972c98254acd511c

  • SHA256

    60424e344c92ea1b04bf0399d35fdceac394eaff2ea025ff9fe4b15c569d2e92

  • SHA512

    bfe9e2a77b279666ad9907e7e61f40e90dcf865717e63fdb27879465071f8ce495e0249e3005d6f490f09fea1f3aaaa9d81a66674557e683c48e5461cd2f2083

  • SSDEEP

    393216:VT124hRg8gApTXpavxiVHCbDt4GkweyPy64GEukps9h:VT124ndbpFCikb54yPy6L3

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\60424e344c92ea1b04bf0399d35fdceac394eaff2ea025ff9fe4b15c569d2e92.exe
    "C:\Users\Admin\AppData\Local\Temp\60424e344c92ea1b04bf0399d35fdceac394eaff2ea025ff9fe4b15c569d2e92.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2272-0-0x0000000000400000-0x00000000010B0000-memory.dmp

    Filesize

    12.7MB

  • memory/2272-1-0x0000000000400000-0x00000000010B0000-memory.dmp

    Filesize

    12.7MB

  • memory/2272-2-0x0000000000400000-0x00000000010B0000-memory.dmp

    Filesize

    12.7MB

  • memory/2272-3-0x0000000000400000-0x00000000010B0000-memory.dmp

    Filesize

    12.7MB