Analysis

  • max time kernel
    16s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    18-11-2024 17:09

General

  • Target

    aeae93ca64eae2c8cbaadd12ed4eaa077acf8b7b182537ff3664fa1e6dd4f51b.exe

  • Size

    72KB

  • MD5

    00c3de6ba5508947e66441aa791b5cc0

  • SHA1

    a53ac588933d05bcf8b5898ab053964e3e0811a6

  • SHA256

    aeae93ca64eae2c8cbaadd12ed4eaa077acf8b7b182537ff3664fa1e6dd4f51b

  • SHA512

    4b5a1d6ebfb5d5d7f617816493af20f017c97c50c122d4b64c9b5f526027fac220e103755b187c7b3f9da280cad70e1974eb5efcdda2dff024af45409d52d57b

  • SSDEEP

    1536:ILTYdVOXoy5KtNuEzzy45xD3uqBGMb+KR0Nc8QsJq3X:u4y4i+Ge0Nc8QsCX

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aeae93ca64eae2c8cbaadd12ed4eaa077acf8b7b182537ff3664fa1e6dd4f51b.exe
    "C:\Users\Admin\AppData\Local\Temp\aeae93ca64eae2c8cbaadd12ed4eaa077acf8b7b182537ff3664fa1e6dd4f51b.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /C echo 'OS{1af693a5fc85b41e8204482c50b7b751}'
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads