Analysis

  • max time kernel
    110s
  • max time network
    65s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    22-08-2024 07:17

General

  • Target

    f071cd358456002559337dfad52d8310N.exe

  • Size

    1.0MB

  • MD5

    f071cd358456002559337dfad52d8310

  • SHA1

    0307d100aa8a9f5d1ba2920b12652fcec141e504

  • SHA256

    b261156d08b2dd32606f3edc8e0332bb13f0ccf84f19a22511e0dda87f97bcea

  • SHA512

    4bd56128c060c7524b23da4961312538dbb817a072b73e883c7c195d4d115b249482c57112389eb674097f1c1a583d94757d6b79a14044cf55013babf80d692f

  • SSDEEP

    24576:wQ1OIyYqCfVk4Ym/jTnGDcZELIveNN4wgarv84IA79unD0r:wQ1Q6y4YmrVeNSurv84IA79unD6

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f071cd358456002559337dfad52d8310N.exe
    "C:\Users\Admin\AppData\Local\Temp\f071cd358456002559337dfad52d8310N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    PID:824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/824-0-0x0000000000400000-0x000000000053B000-memory.dmp

    Filesize

    1.2MB

  • memory/824-4-0x0000000000401000-0x0000000000402000-memory.dmp

    Filesize

    4KB

  • memory/824-3-0x0000000000230000-0x0000000000232000-memory.dmp

    Filesize

    8KB

  • memory/824-7-0x0000000000400000-0x000000000053B000-memory.dmp

    Filesize

    1.2MB