Analysis

  • max time kernel
    140s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    17/10/2024, 12:45 UTC

General

  • Target

    客户端.exe

  • Size

    43KB

  • MD5

    6ec7cee4a32ebfed128473f3a6baf404

  • SHA1

    d0747bd1a68e558abd4493be4ff579917cb33653

  • SHA256

    5c4ec5092dec477cd713277ebaba086ef9ea450cc94b533f830ac3e6e737d080

  • SHA512

    14c83062617d0df2af864528a86d1031ce30dab753410163672ae9a6b2701c57d733f2af261a4991a70a67935e2c7fc991c99735e103b936f0b221cb88e6f23b

  • SSDEEP

    768:HBnjo7T2FEYKHhCxkha51fSlH2BR2PT3DWBuuu7uuu:hnjixZBlAfcSRsIuuu7uuu

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\客户端.exe
    "C:\Users\Admin\AppData\Local\Temp\客户端.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2792-0-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2792-1-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2792-2-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2792-3-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2792-4-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2792-5-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2792-6-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2792-7-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2792-8-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2792-9-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2792-10-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2792-11-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2792-12-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2792-13-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2792-14-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.