Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2024 21:01

General

  • Target

    53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exe

  • Size

    88KB

  • MD5

    b7edb1da49a202107c84903f263ab0e0

  • SHA1

    556ad05f4d6b65a8ccff2fde7e2d34cb5160effb

  • SHA256

    53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21

  • SHA512

    41be10aab94d3c159518dfc4f0641d9b920ebea9f8767cb940fffba5bccd017cf6404ce8a98005af01d6a47d00c545971e8428118bfbef15b592fc07c674e330

  • SSDEEP

    1536:t5piVnDXkTbhCtaB6GVA/bVQPxfgiqfoOonoKg+yOH5y/yEc:6D0ctAVA/bmxIMnoKjyR/Nc

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exe
    "C:\Users\Admin\AppData\Local\Temp\53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2528-2-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2528-4-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2528-76-0x00000000003B0000-0x00000000003B2000-memory.dmp

    Filesize

    8KB

  • memory/2528-68-0x0000000000390000-0x0000000000391000-memory.dmp

    Filesize

    4KB

  • memory/2528-58-0x0000000000350000-0x0000000000351000-memory.dmp

    Filesize

    4KB

  • memory/2528-38-0x0000000000310000-0x0000000000311000-memory.dmp

    Filesize

    4KB

  • memory/2528-26-0x00000000002F0000-0x00000000002F1000-memory.dmp

    Filesize

    4KB

  • memory/2528-14-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/2528-503-0x00000000003D0000-0x00000000003D2000-memory.dmp

    Filesize

    8KB

  • memory/2528-500-0x00000000003C0000-0x00000000003C2000-memory.dmp

    Filesize

    8KB

  • memory/2528-498-0x00000000003B0000-0x00000000003B2000-memory.dmp

    Filesize

    8KB

  • memory/2528-270444-0x00000000003D0000-0x00000000003D2000-memory.dmp

    Filesize

    8KB

  • memory/2528-270443-0x00000000003C0000-0x00000000003C2000-memory.dmp

    Filesize

    8KB

  • memory/2528-270442-0x00000000003B0000-0x00000000003B2000-memory.dmp

    Filesize

    8KB