Analysis

  • max time kernel
    1561s
  • max time network
    1562s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 02:21

General

  • Target

    30bc4934d7e29c8c4c4c9be0510fc7558fddf8db666a0343784c5cf1587b3af0.exe

  • Size

    184KB

  • MD5

    ee041688d36494fdddf710a3ddb873bd

  • SHA1

    1a93d78c2b2262c02e1fffd54d3f5f4aa8400b76

  • SHA256

    30bc4934d7e29c8c4c4c9be0510fc7558fddf8db666a0343784c5cf1587b3af0

  • SHA512

    c76e2b1bcdc179e358c159c87dde5c185cdec3659e7c33db686f04e3845547ef489ce600a51e99e10b26b0d33fbdca25edf2e1b9dbb81d4ed7f845c9167a17e0

  • SSDEEP

    3072:zsj3FGQtB/fDq/8QJ+mkkk9mADOS0WlbEJV1OaqpEZtBgoh1vErXhcKrWfyB:gj3cQtB/fFQJekHSLbAxpmcKrW

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\30bc4934d7e29c8c4c4c9be0510fc7558fddf8db666a0343784c5cf1587b3af0.exe
    "C:\Users\Admin\AppData\Local\Temp\30bc4934d7e29c8c4c4c9be0510fc7558fddf8db666a0343784c5cf1587b3af0.exe"
    1⤵
    • Drops desktop.ini file(s)
    • System Location Discovery: System Language Discovery
    PID:2868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Desktop\BlockOpen.cr2

    Filesize

    116B

    MD5

    2bfb202e94ac97fd5f433d6d28a588b8

    SHA1

    277b80e5dad018283d9dcca1839394ee075ebb61

    SHA256

    2df9f5b621a3630ce4e4ecb840a733bd9def33757de3e9aaa619336fe0ef7458

    SHA512

    764e3dee0685608692fc863f088ab4153f18db150dde797d6c8c97fc02c00a20cd6e59595895c49644fbf500018cec90793af8f0216ac52efa97b3d8b74272d8

  • memory/2868-0-0x000000007452E000-0x000000007452F000-memory.dmp

    Filesize

    4KB

  • memory/2868-1-0x0000000000B20000-0x0000000000B54000-memory.dmp

    Filesize

    208KB

  • memory/2868-2-0x0000000074520000-0x0000000074C0E000-memory.dmp

    Filesize

    6.9MB

  • memory/2868-15-0x0000000074520000-0x0000000074C0E000-memory.dmp

    Filesize

    6.9MB

  • memory/2868-16-0x0000000074520000-0x0000000074C0E000-memory.dmp

    Filesize

    6.9MB

  • memory/2868-17-0x0000000074520000-0x0000000074C0E000-memory.dmp

    Filesize

    6.9MB