Analysis

  • max time kernel
    570s
  • max time network
    362s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 03:25

General

  • Target

    Dumped_.exe

  • Size

    72KB

  • MD5

    afc0e1b3c683fcfb276f8e054d733945

  • SHA1

    a1ef6e368f78bc147c2ee70449917f3929d669ed

  • SHA256

    86a4ec02684bfd8a055929b0aa6f687bd54e80da0ed689be4e315adf76edbbcb

  • SHA512

    68adc819478468c55e85d9cb476b94a363f7d90df1697cd1a1814180ca1dfb47cba4f584d6706330c7d7e2b1e26092c780345cb59bdf736daf4616f06fae7ce7

  • SSDEEP

    768:0Nt2Lmmi8euodnS53h1O8jFQ3tuL7EAj+WTbibIKFQnjVPoxPaBF77tiU8r:nLZOQRM8Jg12+q7LnjVP0U

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Dumped_.exe
    "C:\Users\Admin\AppData\Local\Temp\Dumped_.exe"
    1⤵
    • Checks computer location settings
    PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\hgybrtlyzvfoikl

    Filesize

    52B

    MD5

    241ce528d53d871b6d1acc37205c2eae

    SHA1

    095f4255e244bdc9289483e901c4ecd3f348f1be

    SHA256

    dbdd37ac8cf3d6eac875133b03690ca4fe030248a4732d3e95dac906fd42e29c

    SHA512

    6ec601a12efe4ea214d8413f5e4c64b33e2d7f27acdb596303391a3f5ca6d468576e9c6400fe852601c7612e26f205443b7e9d277d69517e1ed668ec8d738f0a

  • memory/3028-0-0x0000000000AC0000-0x0000000000AD2000-memory.dmp

    Filesize

    72KB

  • memory/3028-4-0x0000000000AC0000-0x0000000000AD2000-memory.dmp

    Filesize

    72KB