Analysis

  • max time kernel
    179s
  • max time network
    180s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 14:54

General

  • Target

    ee1e59674071a1c4541fbaf6f6f582cc.exe

  • Size

    379KB

  • MD5

    ee1e59674071a1c4541fbaf6f6f582cc

  • SHA1

    f1b3689389c286197e297a903942d20d3527d2c0

  • SHA256

    e6142fe26f2b69d6a0c29383eda5ba3ea883d706aa86f406a79668a346907d34

  • SHA512

    dd3d6dc531b453da6b583da7e0ec40b2f25ebe541ae0a0189d07be4a95491e1d6174c3b2cc9cf97d7fa773991b1fc4b4335e1cc9fa305c6c253fd451474e7e5e

  • SSDEEP

    384:zYfZf7DceK5eDKe5Teuek41UQFn0FWkorqVsiEsbTGETNkrMX4mT6h8CfsqbPpwW:+ZaiKFnQoWTxglb83Yi3iPmbLDC

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee1e59674071a1c4541fbaf6f6f582cc.exe
    "C:\Users\Admin\AppData\Local\Temp\ee1e59674071a1c4541fbaf6f6f582cc.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:1620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1620-0-0x0000000074A8E000-0x0000000074A8F000-memory.dmp

    Filesize

    4KB

  • memory/1620-1-0x0000000001330000-0x0000000001392000-memory.dmp

    Filesize

    392KB

  • memory/1620-2-0x0000000074A80000-0x000000007516E000-memory.dmp

    Filesize

    6.9MB

  • memory/1620-3-0x0000000074A80000-0x000000007516E000-memory.dmp

    Filesize

    6.9MB