Analysis

  • max time kernel
    18s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2024, 17:06

General

  • Target

    blur.exe

  • Size

    397KB

  • MD5

    d470bb711f85eaec8050229432474943

  • SHA1

    932d7a1ef54792ad0917f60dac4785c460da1758

  • SHA256

    1a6a5f6b82f9e8978c8599a84961f1df5b926b2fc10897f2868d58554de06e58

  • SHA512

    d065d93795d2ae354a7bca94f99350136e1ee2db312643e2ea7652af8d467d1265947c67e83eadfb31a1b623af738e0b537ebd8e67d2c1a5401aea8eef103d70

  • SSDEEP

    3072:nfKy1QThgek/AFK3E/KA10veL2alN5y4ewVIKQ7cKlDpDnoNRXicTb4ias3vy3cO:idgekYw3E71+WBVIZHZmQi5VCeEpr

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\blur.exe
    "C:\Users\Admin\AppData\Local\Temp\blur.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c "where /q ffmpeg"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2104
      • C:\Windows\SysWOW64\where.exe
        where /q ffmpeg
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads