Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29-10-2024 00:57

General

  • Target

    $PLUGINSDIR/[RANDOM_STRING].exe

  • Size

    225KB

  • MD5

    13900ce6287bd8f349d90de8e8ff87a8

  • SHA1

    96a5cb3678a0865a2f3e6c1f5a53a2c96bc71d69

  • SHA256

    8c385b140444d9a24d492cda16184ace59d23693f57810255f59b2b352f78e0d

  • SHA512

    ee7819b124c143e834a7d5dd5deca3b49b6566237e3012949a3d50377678d0a4b16030fea611b16d4072c051bd60447b158e958fef66783692deaf6bbdfe565d

  • SSDEEP

    6144:3Lbii5bkgVuN+xSKV7Wkrsf7LsADPfffo4SACw:3XikbkgaISKVgDXfoOCw

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\[RANDOM_STRING].exe
    "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\[RANDOM_STRING].exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads