Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2024, 06:26

General

  • Target

    95b9ea8c36e6eae212d9d435d5f8b021f5e700997e0725d5984c55c0b496e6d0.exe

  • Size

    589KB

  • MD5

    3d5258dc76795bb110d55b1bafa16d6c

  • SHA1

    b1759ac187e3b21b79777b83331509e884e3c528

  • SHA256

    95b9ea8c36e6eae212d9d435d5f8b021f5e700997e0725d5984c55c0b496e6d0

  • SHA512

    5cb28ffd8553025d9ca2c4740756db0b32c256e38342bf2872de5b07db34469a47136cb164ffff85d0e7130677a3bfc1ffc2ac763fc922b020fb90b3f4c4eeba

  • SSDEEP

    6144:YYELX97IxSp1yN7Msuz3MJzBoakJWxWNjQkCCwd4DV8VRJsdct13f7WowgCLe1r3:EIxSp1yRq8CDWRJb7hwQj1Uy

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\95b9ea8c36e6eae212d9d435d5f8b021f5e700997e0725d5984c55c0b496e6d0.exe
    "C:\Users\Admin\AppData\Local\Temp\95b9ea8c36e6eae212d9d435d5f8b021f5e700997e0725d5984c55c0b496e6d0.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1680-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1680-1-0x0000000000400000-0x0000000000498000-memory.dmp

    Filesize

    608KB

  • memory/1680-2-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1680-4-0x0000000000400000-0x0000000000498000-memory.dmp

    Filesize

    608KB

  • memory/1680-6-0x0000000000400000-0x0000000000498000-memory.dmp

    Filesize

    608KB

  • memory/1680-8-0x0000000000400000-0x0000000000498000-memory.dmp

    Filesize

    608KB

  • memory/1680-10-0x0000000000400000-0x0000000000498000-memory.dmp

    Filesize

    608KB

  • memory/1680-12-0x0000000000400000-0x0000000000498000-memory.dmp

    Filesize

    608KB

  • memory/1680-14-0x0000000000400000-0x0000000000498000-memory.dmp

    Filesize

    608KB