Resubmissions

27/10/2024, 16:36 UTC

241027-t4cgaazgqn 7

19/10/2024, 00:17 UTC

241019-ak9swsxfrr 7

30/09/2024, 17:27 UTC

240930-v1devaxbll 7

30/09/2024, 17:00 UTC

240930-vh8g9szdqg 7

30/09/2024, 16:44 UTC

240930-t8tlcsvgjk 7

29/09/2024, 17:22 UTC

240929-vxj38awgng 7

29/09/2024, 16:13 UTC

240929-tn9rvavalh 7

29/09/2024, 01:09 UTC

240929-bhyhhsterq 7

Analysis

  • max time kernel
    119s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27/10/2024, 16:36 UTC

General

  • Target

    SETUP1.exe

  • Size

    280KB

  • MD5

    e40041e0ca436c712332edaa9db7df08

  • SHA1

    deb8ead922f4f1acbadebf0db998f6ba2dc53db0

  • SHA256

    6a15b76e1526e1fd6ebaecacc59c3e954d0feb0b566c81538ea6dad2edcffe16

  • SHA512

    1111be364c3d81dc919d1e7ba7bd141cda6555844d889f00a2b2cb0ee5c19bd0b122ae4b574a3cdfa268668eebec43fa265b44e1b8fa28faaa335824647b8bc2

  • SSDEEP

    6144:0uOQemROOMqMA8K3eEGOCUgtLD2J9dh4bYTJ6QKq:3O2OmMQGp2J9+

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SETUP1.exe
    "C:\Users\Admin\AppData\Local\Temp\SETUP1.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:1628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.