Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-11-2024 22:56

General

  • Target

    62f2fd47d0a3503d3ff5effe1bfc868624525af15e2b002ebc95830db73e5d59.exe

  • Size

    487KB

  • MD5

    16b3be4e45df4b40fe9f23652d884390

  • SHA1

    4ebca80c00e5c46fe414d8f733c55dcfb6b534a8

  • SHA256

    62f2fd47d0a3503d3ff5effe1bfc868624525af15e2b002ebc95830db73e5d59

  • SHA512

    e1f5182db779dbfebea7ceaf5980781eaeaa9c4bed9b98e55392d3477c52488ff3dc7375196b3e5fc437cb69b3a0b5258b8492a667dd30c8794da9c56f687b31

  • SSDEEP

    12288:vuD09AUkNIGBYYv4eK13x13nZHSRVMf139F5wIB7+IwtHwBtVxbesvZtLA+DYY:S09AfNIEYsunZvZ19Zms3

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62f2fd47d0a3503d3ff5effe1bfc868624525af15e2b002ebc95830db73e5d59.exe
    "C:\Users\Admin\AppData\Local\Temp\62f2fd47d0a3503d3ff5effe1bfc868624525af15e2b002ebc95830db73e5d59.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\rochilds\logs.dat

    Filesize

    144B

    MD5

    b99959a7c417bcf415adf3482701e64f

    SHA1

    785cc2049ae2d71ae2b17ff93e2d33364f4a5544

    SHA256

    f2b08d73209d679dd10a71b790c3d452b8ba1ea9c02d814ef2cf3f60c93816c4

    SHA512

    c998056f35371352c191944e389c4914eafa1633421c25a7f493ad458f7369826c7144a302406bf9a357fa96c7cb944887978fc665f33d479676e2254fd55e1e