Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2024 00:35

General

  • Target

    e4a798af173e540a204f29aee5e644161453c010dbc258c94c7cb95485302634.exe

  • Size

    98KB

  • MD5

    9c7327c71f2a4e256cd23e7234767627

  • SHA1

    c0e09b938edd6d460e65adfb6f3b51f7ca4c1671

  • SHA256

    e4a798af173e540a204f29aee5e644161453c010dbc258c94c7cb95485302634

  • SHA512

    6cb796f6b6d9be9fd55c05a5795d6aa0517b13691698642cb794376f17500739d423ebdf731981c5b809c916c1dc177d2781b1c2ac55d756eb94a92d1b58330c

  • SSDEEP

    3072:fJ0KRoUB3VQgJL0kWJ7aWXW3/woYTPTZ8bZuT:fuHUBqyLY7aQEwhT98b+

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4a798af173e540a204f29aee5e644161453c010dbc258c94c7cb95485302634.exe
    "C:\Users\Admin\AppData\Local\Temp\e4a798af173e540a204f29aee5e644161453c010dbc258c94c7cb95485302634.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2016-0-0x0000000000370000-0x000000000038B205-memory.dmp

    Filesize

    108KB

  • memory/2016-1-0x0000000072BF1000-0x0000000072BF2000-memory.dmp

    Filesize

    4KB

  • memory/2016-2-0x0000000000370000-0x000000000038B205-memory.dmp

    Filesize

    108KB

  • memory/2016-3-0x0000000072BF0000-0x000000007319B000-memory.dmp

    Filesize

    5.7MB