Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-10-2024 02:23

General

  • Target

    $PLUGINSDIR/srdctrlr.exe

  • Size

    89KB

  • MD5

    99c5e4c0e2a4e6712aa7bf465ae4817c

  • SHA1

    a22904ad8f567af2893a24570a64c15107ba5326

  • SHA256

    8ea4966cbc796c49e7ba96a05bf9e81cf5e5f61bca3445bd2be96b228aba733a

  • SHA512

    9e32944e5bae95209afd8656636f3891d23f6a9a27f35bd6410f9492589a82c88f53c92742037ad04aa45589a0ef307e8dea3997bccc099f4fcf67c0d7fa8977

  • SSDEEP

    1536:GpgpHzb9dZVX9fHMvG0D3XJSfVk8PSq/74AvEG+4DuqW1ntfaRf2JSK/GlVu:sgXdZt9P6D3XJkVkSSudvf+4DAp8On/d

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\srdctrlr.exe
    "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\srdctrlr.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads