Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/09/2024, 00:13

General

  • Target

    a65a3b8dcf79bc574d64f332e6156cc4ba0a14d5bd5589ad4f9c207e3b25c6fb.exe

  • Size

    168KB

  • MD5

    d81e2e75046f8bb2a35edf7c5a9210e3

  • SHA1

    a0a7f8cc912ea6e702e4c3283e49c7807939b163

  • SHA256

    a65a3b8dcf79bc574d64f332e6156cc4ba0a14d5bd5589ad4f9c207e3b25c6fb

  • SHA512

    42b3a5c6445269d32b5ddaddb63a1be922956c297ca14364f13c8729d266d3e61d7c9bc9ef04658d1b54b0ed2eeeba64ddf174e59edfefa97fda4215eeb645fe

  • SSDEEP

    3072:RikvaSbA5W6nPtznKYC85R1u0Ogsiopuo4Obvxt/NxY5MQwgNdNf7D:Ekv3bIHtzKpqybJNnTNxUMVC97D

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a65a3b8dcf79bc574d64f332e6156cc4ba0a14d5bd5589ad4f9c207e3b25c6fb.exe
    "C:\Users\Admin\AppData\Local\Temp\a65a3b8dcf79bc574d64f332e6156cc4ba0a14d5bd5589ad4f9c207e3b25c6fb.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Bugreport_error.ini

    Filesize

    107B

    MD5

    0830c8f521f531fca9196ce79ecf947a

    SHA1

    4618022a7ad5b9c91d39d71206bc580ddfa71f58

    SHA256

    44ac0e619ca69605c8731c8b6a6fb88bdee221f1f85f8b4ec4a5bc4ff61c629f

    SHA512

    0cd8bb27c4119a7473013cf5cac78ebe3809377ec4a12dec45b48410f11d64b0b684f9b173629862f671267e2d58c2c630524b7383e875d1c9d249c6ab37d4eb

  • memory/2932-0-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2932-12-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB