Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2024, 04:43

General

  • Target

    rstart.exe

  • Size

    33KB

  • MD5

    170370020c71bac242e3d95e04e38ba6

  • SHA1

    cc3aa8d646e880238662c84a0b9d097c62b15451

  • SHA256

    a414859899e0f171bdb746e6048f64892d07ed8399bd5dd1421ad811816ca238

  • SHA512

    f96435501b196c185e065f89d6821d03967a49031c370771b83a898e409174a263c07b9db1cb05baa88f4865bda3738b26a5da424305fb4510b836cda5ca1045

  • SSDEEP

    768:kNIIyLTziWngtv/SOW4U9BybZY9sXqq9N/WOz4z:kNnCz7gNLIcbZY9saaN/WYI

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\rstart.exe
    "C:\Users\Admin\AppData\Local\Temp\rstart.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3028-0-0x0000000074091000-0x0000000074092000-memory.dmp

    Filesize

    4KB

  • memory/3028-1-0x0000000074090000-0x000000007463B000-memory.dmp

    Filesize

    5.7MB