Analysis

  • max time kernel
    20s
  • max time network
    21s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-12-2024 22:09

General

  • Target

    20bf5424a03adde31c785b9fe944616c9f935fa4261007541df7bed6f1d2949bN.exe

  • Size

    14KB

  • MD5

    a2c8616ff75738f9ca119c73830c1390

  • SHA1

    254a73509e3693958a8caf5e7077e363d4d843ce

  • SHA256

    20bf5424a03adde31c785b9fe944616c9f935fa4261007541df7bed6f1d2949b

  • SHA512

    7cf81c3f23e95e8f98dc7e7f1fcbe58c1c622d904c0bf77e435a3654d45d901c4eb4a90606e94b3aae02bc29a372194b3117ea4f309a7d27bc65e402203997f7

  • SSDEEP

    192:jsBzEKRDDfIU0OhEj8fwDeaY7UYKJ213grR+R8rxJdq/hIRun:jk0xK2DPY7KAJax/ohIRw

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20bf5424a03adde31c785b9fe944616c9f935fa4261007541df7bed6f1d2949bN.exe
    "C:\Users\Admin\AppData\Local\Temp\20bf5424a03adde31c785b9fe944616c9f935fa4261007541df7bed6f1d2949bN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c malware.exe
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2088-2-0x00000000013D0000-0x00000000013DB000-memory.dmp

    Filesize

    44KB