Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 17:01

General

  • Target

    file.exe

  • Size

    896KB

  • MD5

    93fdf1b16a3c8a2cb82f5d3dd06480d0

  • SHA1

    474fae5437ff9640b774767187c66eb2878d07b8

  • SHA256

    43f528d5f36334e39f15e4b1125e84d63698500914bfc128255a35d467447323

  • SHA512

    819536928dabf4c6a8eac0ba753b9f81b8ce093503257fbae77ca41acb7b7a48d8502f57fbd4588c15fd44f1edc35ece98e692b15d9d076378bfe230e0ae21cb

  • SSDEEP

    12288:iqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDgaoT+:iqDEvCTbMWu7rQYlBQcBiT6rprG8aw+

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads