Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2024, 09:00

General

  • Target

    fb2812b22e399ad46d1c3da512199be1647ad932dd5c0166d58be87cde3e1876.exe

  • Size

    5.0MB

  • MD5

    f7c96ff131b356fe164c8d666c0f3b46

  • SHA1

    7468349a73f810bcf320dd6ae65cb46fc81a9c10

  • SHA256

    fb2812b22e399ad46d1c3da512199be1647ad932dd5c0166d58be87cde3e1876

  • SHA512

    3ed0e90e947e80af53b74b0e6fbaca4ba4de5005eb066d6a975fc3455320b6e48a8fca7858916769ab1f38143e8a3a63f1452d5568fe5d3728d04e80f583d470

  • SSDEEP

    98304:Br7X73KcrCU3KoRdqPU4RRXuDuDRRXuDuQ:B/j0ounXuDKnXuDz

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb2812b22e399ad46d1c3da512199be1647ad932dd5c0166d58be87cde3e1876.exe
    "C:\Users\Admin\AppData\Local\Temp\fb2812b22e399ad46d1c3da512199be1647ad932dd5c0166d58be87cde3e1876.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2356-7-0x0000000002D10000-0x0000000002E11000-memory.dmp

    Filesize

    1.0MB

  • memory/2356-6-0x0000000010000000-0x000000001003C000-memory.dmp

    Filesize

    240KB

  • memory/2356-24-0x0000000010000000-0x000000001003C000-memory.dmp

    Filesize

    240KB