Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 13:40

General

  • Target

    Project Breakdown Doc.exe

  • Size

    1.3MB

  • MD5

    bf7d24a56c64e6632ff2ca51f08908f8

  • SHA1

    428d664141dc9d2318dacdf51c4ac9efbbdd3847

  • SHA256

    ade930428485f335d9ab8526b0073be5cdf902c7316bf24bf86c69c85ed67d7e

  • SHA512

    dfbecaf21a3c59b0d3248dfb8fb603a321d2fa358d15466143a25ea907014b60182c70caa6395f3a0f0e24fe7662447431df00b8e628b3f50a8a4c4e73d66b2b

  • SSDEEP

    24576:OAHnh+eWsN3skA4RV1Hom2KXMmHa56GGVDLhD1vJVs9JAMu3E5:5h+ZkldoPK8Ya56GGx4bAM3

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Project Breakdown Doc.exe
    "C:\Users\Admin\AppData\Local\Temp\Project Breakdown Doc.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\anaboly

    Filesize

    283KB

    MD5

    1c8e5b6f9cea547a6bff401f911104ac

    SHA1

    964ad4d5ffccba0baa1fdc644559d2bc16b7946c

    SHA256

    9f5dd0de8ba6c85e9ec3573217fe074a8011b2879e562859adf4e1a39839928a

    SHA512

    9d1bb11df2dff681be708bed0ba213286adf830284b87540fd9af45cde7d37c5c6c22894c4189c75d2ebac11b6d7fdb10293a3d7ec3e6428012094ac23dc0be1

  • memory/1764-6-0x0000000000560000-0x0000000000564000-memory.dmp

    Filesize

    16KB