Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 18:58

General

  • Target

    2668f1dd9be6124329a5f6e49f6e39a72088a93172db60578ac083421053936bN.exe

  • Size

    468KB

  • MD5

    252ae00690ad2b691e1a80f61013bf60

  • SHA1

    b89067c9da1adbdda9d65baf5a85aa1a2fc00430

  • SHA256

    2668f1dd9be6124329a5f6e49f6e39a72088a93172db60578ac083421053936b

  • SHA512

    1330e731479d1163a2032104fd1d1da37097234f8deddc5d63678f4d2c4b46dd935b379a02e4bddaca36b2f814b8a5b47af1b0b74a2cdcbf5756193a0ddb6e30

  • SSDEEP

    3072:U0LobKxjy8xeZYXBz3eqf8/MCnkh1pD6mfIiVBh6zFJnokNe0ln:UIooLxeGBDeqfpT2C6zjokNe

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2668f1dd9be6124329a5f6e49f6e39a72088a93172db60578ac083421053936bN.exe
    "C:\Users\Admin\AppData\Local\Temp\2668f1dd9be6124329a5f6e49f6e39a72088a93172db60578ac083421053936bN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Unicorn-23718.exe

    Filesize

    468KB

    MD5

    93bd6cb90b85c38388ba0de693c54582

    SHA1

    c6cab7643138561a6789c169511fdb9658dfef75

    SHA256

    fc7c07b1f031a5eb758b5850892bb13e04fcccc6b711d9dcafd8e60a24e0b36c

    SHA512

    72516142b7e7d85e9a8c0360642724523a2d21234887ab8b3a8bfccedc5aeae10292f991ac519919d3fb2a72a6b3894f9497958f4de4508d1d99809123684bf8

  • memory/2364-0-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/2364-29-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB