Analysis

  • max time kernel
    149s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2024, 10:09

General

  • Target

    bdec97ee615088549771300bd65d6114a74dd0a4c1ecc6bb4ffc8ac484f19fac.exe

  • Size

    896KB

  • MD5

    8bacad1c57463f2e403ca5656ffa129e

  • SHA1

    7cd8041fb1bd703d31f778700813531ed43882da

  • SHA256

    bdec97ee615088549771300bd65d6114a74dd0a4c1ecc6bb4ffc8ac484f19fac

  • SHA512

    40a5a0cabd2561b2d32ec14e91172db6f812d0e2dcc6cfda3a2f458e0994fc387324212bd47f21acb6d05bed151a96ad444a0a5a7f7bb35ae6fd0dcd57d25d64

  • SSDEEP

    12288:hu6sfBgtsGvd2StQYeO0B9pPtaRh2E8jVX3HoDdsogttZ:hn0BgtscdTtOOa9pfthIDdsRttZ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bdec97ee615088549771300bd65d6114a74dd0a4c1ecc6bb4ffc8ac484f19fac.exe
    "C:\Users\Admin\AppData\Local\Temp\bdec97ee615088549771300bd65d6114a74dd0a4c1ecc6bb4ffc8ac484f19fac.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads