Analysis

  • max time kernel
    239s
  • max time network
    240s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    11-09-2024 15:50

General

  • Target

    OC_7001628119_7068059988.exe

  • Size

    1.0MB

  • MD5

    cf702544b48bbe770375eb7188464eb8

  • SHA1

    d19daad1628bccb94b5e5cbea08310231def8d99

  • SHA256

    c40c36978fc01bcbd7eca78bb7b5689b7460bbe7ef122cc2a2cde6fc415d24e0

  • SHA512

    0461297a310f67479c6d9195c25ea4559728b7ac78d3120dc689511373880a2800cef45b960b7d4b5fd23b87c0254ef7e139197d12e0af55b6b07759c9822192

  • SSDEEP

    24576:Q4lavt0LkLL9IMixoEgeadFnfJgV3q9MmCS:Hkwkn9IMHeadpRgpaPCS

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\OC_7001628119_7068059988.exe
    "C:\Users\Admin\AppData\Local\Temp\OC_7001628119_7068059988.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1760-5-0x0000000000200000-0x0000000000204000-memory.dmp

    Filesize

    16KB