Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/11/2024, 22:11

General

  • Target

    Oasd4pa1.exe

  • Size

    224KB

  • MD5

    5b0f82684f811c72de3c76a9148914d8

  • SHA1

    cc4fadf1f7807ce0a0ee7a777be856a1e58f45ae

  • SHA256

    bbdf65cce2936e403c39008d1c68dcf276f03bd1abbd93e50c41c01181dbaa71

  • SHA512

    51623d07d9d0990e0540fcb5b368e5a02be97fd7059c290f77b3ba2883329aa3f4c4296e15d598136fb97d691a15bde30b7b6b79454b2da947100188632066c0

  • SSDEEP

    6144:WegxDqIb49gqSBu842kzjQgX06l8+8OMkN:WelgaFc6a/Tk

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Oasd4pa1.exe
    "C:\Users\Admin\AppData\Local\Temp\Oasd4pa1.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads