Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2024 14:07

General

  • Target

    RFQ7-82927766783 WF242183 TRGR-989789引流管 中性.xlsx.exe

  • Size

    82KB

  • MD5

    5405c36dca0a57d8a6632550b0cba212

  • SHA1

    9f487e0902b7c39a4c4dd8dd9e918dc3dc10245c

  • SHA256

    8d429a2e8f8b5403c44cb7597598c2ba18a40ccb464f2997426d3eefbbd888c0

  • SHA512

    c699a965e289613d31f699494328f9570abc61ea437ab199afbb266c923c9383c366e3f4bec1de27614f2d9672de5449ee39e0d3614df3f315a2b64fad2e8e6b

  • SSDEEP

    1536:eKPDl0ZVabbkg9ot5dR7GqPoS95sRvWQONAjzGX+:eKPDOZVEbkg6lKC0eBNAjzV

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RFQ7-82927766783 WF242183 TRGR-989789引流管 中性.xlsx.exe
    "C:\Users\Admin\AppData\Local\Temp\RFQ7-82927766783 WF242183 TRGR-989789引流管 中性.xlsx.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:1048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1048-0-0x0000000074EBE000-0x0000000074EBF000-memory.dmp

    Filesize

    4KB

  • memory/1048-1-0x0000000001090000-0x00000000010AA000-memory.dmp

    Filesize

    104KB

  • memory/1048-2-0x0000000074EB0000-0x000000007559E000-memory.dmp

    Filesize

    6.9MB

  • memory/1048-3-0x0000000074EBE000-0x0000000074EBF000-memory.dmp

    Filesize

    4KB

  • memory/1048-4-0x0000000074EB0000-0x000000007559E000-memory.dmp

    Filesize

    6.9MB