Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    29-08-2024 02:40

General

  • Target

    flashplayer_11_sa_debug_32bit.exe

  • Size

    8.9MB

  • MD5

    aa504203f63dce187b370924c3d2e1b8

  • SHA1

    b6f47758f394a85cf7b4912d1e15b5e56e3b9d45

  • SHA256

    b430688b6f1c9796c69a4dd5df0c79533d5ce4c338bf5cf46b18afe745c16f76

  • SHA512

    d7492611ad8532e88490fd9eaaf93938263a4374da0f40c2672cebcd22b085d580c229f882450dd6b3be5e0219ded1c7bef0b34cba45b4678846192dabee8257

  • SSDEEP

    196608:YaaEBKG9DhK5MnCMm4qCVeiuHMco+q15Fq+/0s/O4:YfEZ7Vm1iuo+q1Ts4

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\flashplayer_11_sa_debug_32bit.exe
    "C:\Users\Admin\AppData\Local\Temp\flashplayer_11_sa_debug_32bit.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Modifies registry class
    PID:2716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\settings.sxx

    Filesize

    407B

    MD5

    1c67c593841ddf3960ad507bd8b50689

    SHA1

    760b679630cec7ded603bdab6136990f2f416224

    SHA256

    8b44923b6e9ac702f506ad896c3b1708badaf8bd3a285a4f3b73bdfece9d2af4

    SHA512

    3859592a5fa4c008d7270e31eabfa7e5b28998a951b134df153d845f2f7f44ae5fa66f97489e036acad8e701b730dfa9b214e10c151dad476fbd8c86a8d4b838

  • memory/2716-0-0x00000000002C0000-0x00000000002C1000-memory.dmp

    Filesize

    4KB