Analysis

  • max time kernel
    149s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27-09-2024 19:58

General

  • Target

    9be010b45a81a22f2d50c1d35f31384152c5b91dd7e3a1fe81b2c4fa95bb468c.exe

  • Size

    14KB

  • MD5

    96f87431a557d00dc8ef98e55530b1c9

  • SHA1

    9994132df50099e30487729c4ffce6418f889028

  • SHA256

    9be010b45a81a22f2d50c1d35f31384152c5b91dd7e3a1fe81b2c4fa95bb468c

  • SHA512

    254e7da276eaad49d147d7105e115c629bcf0fd1d68b3c2be5027d54d93e18130539b21d4b60f479facf12a05f58e8216607a6ae43c6303b85f0285ec2c0a9dc

  • SSDEEP

    192:h+8C+EKS0O9ejYTDG8bcp4LlZJbhFuPcS5NbvpoHDrJEBkGxVXK8oNCRJB:hNVjYTDG8gpUhhFu35x2HDFEnxloNU

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9be010b45a81a22f2d50c1d35f31384152c5b91dd7e3a1fe81b2c4fa95bb468c.exe
    "C:\Users\Admin\AppData\Local\Temp\9be010b45a81a22f2d50c1d35f31384152c5b91dd7e3a1fe81b2c4fa95bb468c.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2704

Network

  • flag-us
    DNS
    sensual2020.ddns.net
    9be010b45a81a22f2d50c1d35f31384152c5b91dd7e3a1fe81b2c4fa95bb468c.exe
    Remote address:
    8.8.8.8:53
    Request
    sensual2020.ddns.net
    IN A
    Response
    sensual2020.ddns.net
    IN A
    0.0.0.0
No results found
  • 8.8.8.8:53
    sensual2020.ddns.net
    dns
    9be010b45a81a22f2d50c1d35f31384152c5b91dd7e3a1fe81b2c4fa95bb468c.exe
    66 B
    82 B
    1
    1

    DNS Request

    sensual2020.ddns.net

    DNS Response

    0.0.0.0

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2704-0-0x00000000747F1000-0x00000000747F2000-memory.dmp

    Filesize

    4KB

  • memory/2704-1-0x00000000747F0000-0x0000000074D9B000-memory.dmp

    Filesize

    5.7MB

  • memory/2704-2-0x00000000747F0000-0x0000000074D9B000-memory.dmp

    Filesize

    5.7MB

  • memory/2704-3-0x00000000747F0000-0x0000000074D9B000-memory.dmp

    Filesize

    5.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.