Analysis

  • max time kernel
    16s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 13:30

General

  • Target

    a0294fa61c072b5f8d3706f31d3a00319b07d2eb6e79b945d78b4c4e7ab7199eN.exe

  • Size

    73KB

  • MD5

    c7198f1c97ddf29a642a80d6cad8ab50

  • SHA1

    2c0809937d2c66ddfaefefc235bab0e04a7c87b5

  • SHA256

    a0294fa61c072b5f8d3706f31d3a00319b07d2eb6e79b945d78b4c4e7ab7199e

  • SHA512

    da908ed08f3fc6b2c8ae2a0a853b54f43cf722111b22b728a1ff58dc4ce7b84df075120b6f8333b4bd401b1fbcfb51f5c7070983f82a245c8ef3327a718966a1

  • SSDEEP

    1536:hbSYv9ZK5QPqfhVWbdsmA+RjPFLC+e5hy0ZGUGf2g:hGYvHNPqfcxA+HFshyOg

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a0294fa61c072b5f8d3706f31d3a00319b07d2eb6e79b945d78b4c4e7ab7199eN.exe
    "C:\Users\Admin\AppData\Local\Temp\a0294fa61c072b5f8d3706f31d3a00319b07d2eb6e79b945d78b4c4e7ab7199eN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c 00.exe
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2412-5-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB