Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-09-2024 17:11

General

  • Target

    CJ_ZJJJS_BX2.1/Menu/TestImages.exe

  • Size

    109KB

  • MD5

    f214311f2617004d71a3362546aa7c7e

  • SHA1

    64dc0047f684da6a0b612eed0a2be7dc6b20d974

  • SHA256

    a977c5f6388e72655f04e083ea7ccd2d948f54c747da014a05566fa6bb228365

  • SHA512

    42d8d5e14e85b0e17a1bacbd2a5d03eccf0144f2ee825c9c9165812b611b442fef32ef93fde0ebda9828793f3587dea31ef0506f3cb0338e2705e3fcf9000f33

  • SSDEEP

    3072:5zNWMKKRZYchObK91C8sV6Xmoo4LEpYC8iJkZ8:5ZuuObR8sVImcyYC5Jy8

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\CJ_ZJJJS_BX2.1\Menu\TestImages.exe
    "C:\Users\Admin\AppData\Local\Temp\CJ_ZJJJS_BX2.1\Menu\TestImages.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1940-4-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB