Analysis

  • max time kernel
    1200s
  • max time network
    844s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-11-2024 19:27

General

  • Target

    b4c2ffccfe807167860d70ea95cde0390f2dc4220992d272497ced04afb97edd.exe

  • Size

    808KB

  • MD5

    e49c40f6a69af400f2e11dd8fe6604dd

  • SHA1

    56107d38cc5a94c67bdb92aa7566768b8e82b1f2

  • SHA256

    b4c2ffccfe807167860d70ea95cde0390f2dc4220992d272497ced04afb97edd

  • SHA512

    80f782bf58a405559a1140be30838b7d46ddca5423d9001cb1f87005e0e46e2a6e20ae3229bd095e86d8f2fbc30020a7be8f08c7f47f095247168424b2412e28

  • SSDEEP

    12288:oTsKNGpaBPxBlvdtsYuj+Ue8vQjY7heDHcMicoXfC/ye:YNG+PxvU3tvQweDHydqJ

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4c2ffccfe807167860d70ea95cde0390f2dc4220992d272497ced04afb97edd.exe
    "C:\Users\Admin\AppData\Local\Temp\b4c2ffccfe807167860d70ea95cde0390f2dc4220992d272497ced04afb97edd.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    PID:2784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2784-0-0x00000000003A0000-0x00000000003A1000-memory.dmp

    Filesize

    4KB

  • memory/2784-3-0x00000000003A0000-0x00000000003A1000-memory.dmp

    Filesize

    4KB

  • memory/2784-2-0x0000000000400000-0x00000000004D1000-memory.dmp

    Filesize

    836KB