Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 01:43

General

  • Target

    ALI213-SaintsRIV.11Tr.LNG.v1.0/SaintsRIV+11Tr-LNG_v1.0.exe

  • Size

    2.3MB

  • MD5

    4f4221f2347f1abe30b43d09c9167f28

  • SHA1

    e8b655e979d532cfb8fa88bd0cb210aca6bc6a01

  • SHA256

    5ccae25f0a50a8ea380dfadfbbf2f54c13b30ac41eb9d12635898295cd3d93f5

  • SHA512

    ffb69f7c82d2306f894cde79cc50588b45a6fd8b33ea2b745c734ed458c8b5809b31f71e19c5bed6270a92e0429e7975a22d61927919720518d9605788424e5b

  • SSDEEP

    49152:A/1P5hTnpAWDM2MMMAIwC+TaMFsjeZdtVON7Rapv98Ct2U7CcKNpi+3Sq:A/1RLAWDMbMMF9+TaMFsjKdHObKqCcP9

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ALI213-SaintsRIV.11Tr.LNG.v1.0\SaintsRIV+11Tr-LNG_v1.0.exe
    "C:\Users\Admin\AppData\Local\Temp\ALI213-SaintsRIV.11Tr.LNG.v1.0\SaintsRIV+11Tr-LNG_v1.0.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/696-0-0x0000000000400000-0x0000000000CF8000-memory.dmp

    Filesize

    9.0MB

  • memory/696-3-0x0000000001650000-0x0000000001F48000-memory.dmp

    Filesize

    9.0MB

  • memory/696-2-0x0000000001650000-0x0000000001F48000-memory.dmp

    Filesize

    9.0MB

  • memory/696-1-0x0000000001650000-0x0000000001F48000-memory.dmp

    Filesize

    9.0MB

  • memory/696-4-0x0000000000400000-0x0000000000CF8000-memory.dmp

    Filesize

    9.0MB

  • memory/696-8-0x0000000000400000-0x0000000000CF8000-memory.dmp

    Filesize

    9.0MB