Analysis

  • max time kernel
    148s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 18:12

General

  • Target

    ab9f1cfbdbb9f96f3f54b2a680c8faaba1f903d5778415352236b9e10c001707.exe

  • Size

    4.9MB

  • MD5

    78c8074666653a420b3854b312773430

  • SHA1

    38bd96b5f2d701a763d906659393709f76da03fc

  • SHA256

    ab9f1cfbdbb9f96f3f54b2a680c8faaba1f903d5778415352236b9e10c001707

  • SHA512

    266a408338b7bf85f6c1b1e82a528c0e3d75eee1d6ea3de24363eaf54c9674b7f521350ca399ed3e1e6a2ea1cfeabd207ff6a5a5b937f0811620defeca1226ff

  • SSDEEP

    98304:xnHhviTwPbesu9v076h0X42jbZnlDMEy4+H019Bc1bnqiMKpSvkIJ87Ye:1Hh3S9v0AI4ulwELL3S1bnq8pSvkI/e

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab9f1cfbdbb9f96f3f54b2a680c8faaba1f903d5778415352236b9e10c001707.exe
    "C:\Users\Admin\AppData\Local\Temp\ab9f1cfbdbb9f96f3f54b2a680c8faaba1f903d5778415352236b9e10c001707.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2804

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2804-0-0x0000000000400000-0x0000000000B1B000-memory.dmp

          Filesize

          7.1MB

        • memory/2804-1-0x00000000766F0000-0x0000000076737000-memory.dmp

          Filesize

          284KB

        • memory/2804-503-0x0000000002A30000-0x0000000002B41000-memory.dmp

          Filesize

          1.1MB

        • memory/2804-510-0x0000000002A30000-0x0000000002B41000-memory.dmp

          Filesize

          1.1MB

        • memory/2804-518-0x0000000002A30000-0x0000000002B41000-memory.dmp

          Filesize

          1.1MB

        • memory/2804-534-0x0000000002A30000-0x0000000002B41000-memory.dmp

          Filesize

          1.1MB

        • memory/2804-504-0x0000000002A30000-0x0000000002B41000-memory.dmp

          Filesize

          1.1MB

        • memory/2804-545-0x0000000002A30000-0x0000000002B41000-memory.dmp

          Filesize

          1.1MB

        • memory/2804-512-0x0000000002A30000-0x0000000002B41000-memory.dmp

          Filesize

          1.1MB

        • memory/2804-508-0x0000000002A30000-0x0000000002B41000-memory.dmp

          Filesize

          1.1MB

        • memory/2804-550-0x0000000002A30000-0x0000000002B41000-memory.dmp

          Filesize

          1.1MB

        • memory/2804-546-0x0000000002A30000-0x0000000002B41000-memory.dmp

          Filesize

          1.1MB

        • memory/2804-542-0x0000000002A30000-0x0000000002B41000-memory.dmp

          Filesize

          1.1MB

        • memory/2804-540-0x0000000002A30000-0x0000000002B41000-memory.dmp

          Filesize

          1.1MB

        • memory/2804-538-0x0000000002A30000-0x0000000002B41000-memory.dmp

          Filesize

          1.1MB

        • memory/2804-536-0x0000000002A30000-0x0000000002B41000-memory.dmp

          Filesize

          1.1MB

        • memory/2804-532-0x0000000002A30000-0x0000000002B41000-memory.dmp

          Filesize

          1.1MB

        • memory/2804-530-0x0000000002A30000-0x0000000002B41000-memory.dmp

          Filesize

          1.1MB

        • memory/2804-528-0x0000000002A30000-0x0000000002B41000-memory.dmp

          Filesize

          1.1MB

        • memory/2804-526-0x0000000002A30000-0x0000000002B41000-memory.dmp

          Filesize

          1.1MB

        • memory/2804-524-0x0000000002A30000-0x0000000002B41000-memory.dmp

          Filesize

          1.1MB

        • memory/2804-522-0x0000000002A30000-0x0000000002B41000-memory.dmp

          Filesize

          1.1MB

        • memory/2804-520-0x0000000002A30000-0x0000000002B41000-memory.dmp

          Filesize

          1.1MB

        • memory/2804-516-0x0000000002A30000-0x0000000002B41000-memory.dmp

          Filesize

          1.1MB

        • memory/2804-514-0x0000000002A30000-0x0000000002B41000-memory.dmp

          Filesize

          1.1MB

        • memory/2804-506-0x0000000002A30000-0x0000000002B41000-memory.dmp

          Filesize

          1.1MB

        • memory/2804-564-0x0000000002A30000-0x0000000002B41000-memory.dmp

          Filesize

          1.1MB

        • memory/2804-563-0x0000000002A30000-0x0000000002B41000-memory.dmp

          Filesize

          1.1MB

        • memory/2804-560-0x0000000002A30000-0x0000000002B41000-memory.dmp

          Filesize

          1.1MB

        • memory/2804-558-0x0000000002A30000-0x0000000002B41000-memory.dmp

          Filesize

          1.1MB

        • memory/2804-556-0x0000000002A30000-0x0000000002B41000-memory.dmp

          Filesize

          1.1MB

        • memory/2804-554-0x0000000002A30000-0x0000000002B41000-memory.dmp

          Filesize

          1.1MB

        • memory/2804-552-0x0000000002A30000-0x0000000002B41000-memory.dmp

          Filesize

          1.1MB

        • memory/2804-548-0x0000000002A30000-0x0000000002B41000-memory.dmp

          Filesize

          1.1MB

        • memory/2804-2239-0x0000000002780000-0x0000000002901000-memory.dmp

          Filesize

          1.5MB

        • memory/2804-7789-0x0000000000400000-0x0000000000B1B000-memory.dmp

          Filesize

          7.1MB