Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    27-09-2024 14:19

General

  • Target

    68c7df32a50bb4509c7845fc26de2ee04aed93d0e4804032035fcb0f323bb010N.exe

  • Size

    134KB

  • MD5

    8442af226a63a830d2358c5c645fbaf0

  • SHA1

    093f5a6eb324e2e0f217b37f4e77b3e8239ea221

  • SHA256

    68c7df32a50bb4509c7845fc26de2ee04aed93d0e4804032035fcb0f323bb010

  • SHA512

    8c03e50d66ef78f18760593944bad039a7a75ee5d019c9f51df80c2535ef4f8759de7183237f3cf3593b5d2f58d7cdb84fb804ef58af751c2d58e97ce540eb37

  • SSDEEP

    3072:AZDWuTaVbuwkmsH4GSHHHHxU1quN2z/64CRmJmH2W3PIHNF/VHXvBFYEj:AZaVw2ZGSHHHHGNq/65Rm413AtHJFR

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\68c7df32a50bb4509c7845fc26de2ee04aed93d0e4804032035fcb0f323bb010N.exe
    "C:\Users\Admin\AppData\Local\Temp\68c7df32a50bb4509c7845fc26de2ee04aed93d0e4804032035fcb0f323bb010N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads