Analysis

  • max time kernel
    16s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2024, 17:08

General

  • Target

    MP3GainGUI.exe

  • Size

    616KB

  • MD5

    f3a35fd430520d2f5261c2fc9296ba80

  • SHA1

    b0d8861c07bb718c5cccf29593a6f30e8eec7b92

  • SHA256

    786e7a7dcca24bf8b1c031be6fa8ed046212534c3e6062a46dd96a1f8c658dfb

  • SHA512

    ddc287f5354931bb53a5c38aa7ff5f41dc2c3adbe90defdc9e78540bd15eef23f3daeb32481bf0b16ccf720a43b2f1094e63c77fbb3a3f70cce47f7c1d145a4f

  • SSDEEP

    12288:ZkNRcLzsuM5ROFi1lvOdUGlqTug16kI1dPYv6G7T79VSYdZAi+fS5o6x0L2:MRcvvM59lvOdUGlkUG7T7LSYdZAi+fSv

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MP3GainGUI.exe
    "C:\Users\Admin\AppData\Local\Temp\MP3GainGUI.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1864
    • C:\Users\Admin\AppData\Local\Temp\mp3gain.exe
      C:\Users\Admin\AppData\Local\Temp\mp3gain /v
      2⤵
        PID:1652

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads