Analysis

  • max time kernel
    16s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 00:52

General

  • Target

    cb4c9fad130475fef052da75ace02970N.exe

  • Size

    64KB

  • MD5

    cb4c9fad130475fef052da75ace02970

  • SHA1

    74df2106da72504f990891b84a20bc9bba926c58

  • SHA256

    87878ae24d2148eba7907d82d370fee40498b4cd5c2418642e8f114cbce626d1

  • SHA512

    12435f845bbdec580f8e849b3ca0a8bf0f3fefa26621765efd39b1cab8a7ca5d835c3a9f92fce66b5e37ee5886fa8650b5ae690cba9d07220dff18e800e19edb

  • SSDEEP

    768:W7BlpppARFbhHFoqAJwBqAJw70EXBwzEXBwOvEJcvEJxqL3hN:W7ZppApqvZv9L3hN

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb4c9fad130475fef052da75ace02970N.exe
    "C:\Users\Admin\AppData\Local\Temp\cb4c9fad130475fef052da75ace02970N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1488

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads