Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/09/2024, 20:23

General

  • Target

    ef4d955b7204854a05b8127bb4105200N.exe

  • Size

    40KB

  • MD5

    ef4d955b7204854a05b8127bb4105200

  • SHA1

    c4524e69ceaa4fc1e6ad3f3744d7abdc419c525b

  • SHA256

    ad9348474eba57053b496e83e114a0c74dec1465c1d22614f72fd49aa32b82e5

  • SHA512

    6352425bd96c87981b331d48b612e0a129c7424b86b326aba370e2deb1c0db437fa12c6252520b8f9fc7944496efd057698dc6eb29bc3b966fdb5ed041465644

  • SSDEEP

    768:MnV9UeBmsv6hGIqi06LeChWg8lFBAWfzYioRoDqHpVJ:4V9XTCxKg8F7moDCJ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef4d955b7204854a05b8127bb4105200N.exe
    "C:\Users\Admin\AppData\Local\Temp\ef4d955b7204854a05b8127bb4105200N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads