Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 16:02

General

  • Target

    bd209a75f783907fcc4af74a0552d661088056ded6a363fb853c4a35ea06c315.exe

  • Size

    1.0MB

  • MD5

    9e5cc59a17a270afd79f88c3f21e958a

  • SHA1

    274f82b645b136b6933d71ebf84a20df78e36c6a

  • SHA256

    bd209a75f783907fcc4af74a0552d661088056ded6a363fb853c4a35ea06c315

  • SHA512

    fff6219e9ae226ab5df2d3f65c9ff2cd385f35e7da796ba9dcb08f796bb3c9cbd81dc3cd0c4d82cabb3512972aa3bd7b478ec9caa49c034da5730fb2441e4c48

  • SSDEEP

    12288:jHej0N4WCZ1sTVH2Vr7CZXbiHnudPUaWaR5vwNyZ5cWeFWLE:j3N4WCPspH2VyZLmudPUytwNyZq/FWw

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd209a75f783907fcc4af74a0552d661088056ded6a363fb853c4a35ea06c315.exe
    "C:\Users\Admin\AppData\Local\Temp\bd209a75f783907fcc4af74a0552d661088056ded6a363fb853c4a35ea06c315.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads