Analysis

  • max time kernel
    0s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/09/2024, 09:37

General

  • Target

    0f0f14d102e234b35d002e2a0cdc2e20N.exe

  • Size

    228KB

  • MD5

    0f0f14d102e234b35d002e2a0cdc2e20

  • SHA1

    9467ebf5ac7b584b9013606709cbeea08a6697e6

  • SHA256

    8f27ae0d8c31b39fcaccfe5c90fd295f98047e29c57d87809f076ebc9b32f7d1

  • SHA512

    79043fee202e5bcc1de4437de8be9ff0edb9c5f7d7b1c675728db761aefc34b8253c103066625997fda7678362baec963c40c362c8719d75e159c8b0e27c8a78

  • SSDEEP

    6144:kcY5anoJvgP0+s/wWr8foO4bAdP0EAlXmbD3lZw:kc8modgP0+s/wWr8foO4bAdP0EAGZw

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f0f14d102e234b35d002e2a0cdc2e20N.exe
    "C:\Users\Admin\AppData\Local\Temp\0f0f14d102e234b35d002e2a0cdc2e20N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2260
    • C:\Users\Admin\buubeo.exe
      "C:\Users\Admin\buubeo.exe"
      2⤵
        PID:2984

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\buubeo.exe

            Filesize

            228KB

            MD5

            8048bc7fe56f0806aeacd0549f897603

            SHA1

            51bf4d4c47d0896d1924177dc48e29cdd27c3bdd

            SHA256

            001ccf07d19dd39d0425ed4be469d7e501cb01f73c44176d34b776ae01c53d49

            SHA512

            5637efacb0c60d996fe967f57a67d197781718ce833d1a5ebf123107b8443169b9536bb5c4fba839918b5b5b57837f696b75b07645c1a084b7752a1639035d4b

          • memory/2260-0-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2260-15-0x0000000002A00000-0x0000000002A42000-memory.dmp

            Filesize

            264KB

          • memory/2260-13-0x0000000002A00000-0x0000000002A42000-memory.dmp

            Filesize

            264KB

          • memory/2260-20-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2984-16-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2984-21-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB