Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26/08/2024, 06:56

General

  • Target

    968bdbd22b864e108a0fa53b5a4eecdba2f270227d28e8989ff0dff67c6267ea.exe

  • Size

    4.4MB

  • MD5

    c4a913b8303289158dc8bd5bb2c2192f

  • SHA1

    055004771dabf79deba0653e3eded9c3f0738a90

  • SHA256

    968bdbd22b864e108a0fa53b5a4eecdba2f270227d28e8989ff0dff67c6267ea

  • SHA512

    5a32efecfb3a6c8fafd800307b01045663dd4cdac2179cbecb031ea96236699e8c67407b5a3a2ad0d7755506c8e2a762038ff7c5d986d83c0c0d67c8d974b2dd

  • SSDEEP

    98304:DTfAV9Zvdfd53jT8MQdvR9MB4CLd76HVPYSJiK3dYr:DgVf38DM2C57YPYYiyq

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\968bdbd22b864e108a0fa53b5a4eecdba2f270227d28e8989ff0dff67c6267ea.exe
    "C:\Users\Admin\AppData\Local\Temp\968bdbd22b864e108a0fa53b5a4eecdba2f270227d28e8989ff0dff67c6267ea.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    PID:2740

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2740-0-0x0000000000400000-0x0000000000CA6000-memory.dmp

          Filesize

          8.6MB

        • memory/2740-1-0x00000000028D0000-0x00000000029B2000-memory.dmp

          Filesize

          904KB

        • memory/2740-2-0x0000000000400000-0x0000000000CA6000-memory.dmp

          Filesize

          8.6MB

        • memory/2740-3-0x00000000028D0000-0x00000000029B2000-memory.dmp

          Filesize

          904KB