Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13-12-2024 21:25

General

  • Target

    The-MALWARE-Repo-master/Worm/Netres.a.exe

  • Size

    372KB

  • MD5

    d543f8d2644b09445d9bc4a8a4b1a8c0

  • SHA1

    72a7b4fb767c47f15280c053fba80de1e44d7173

  • SHA256

    1c0e2b7981ffa9e86185b7a7aac93f13629d92d8f58769569483202b3a926ce5

  • SHA512

    9cd77db4a1fe1f0ec7779151714371c21ed798091d9022cec6643c79b2f3c87554a0b7f01c4014e59d0d1a131922a801413d37236ef1c49506f8e1aa5b96e167

  • SSDEEP

    6144:YEo6WDhsj7atyB3FATvzOdy9uyEP4TpDaO5pHCclI0SCVsMHAiBq2R:IzDhmatywCdy9uxPI75C0VVsUBq

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Worm\Netres.a.exe
    "C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Worm\Netres.a.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\v1.log

    Filesize

    479B

    MD5

    2a4c60601077611f9aa5345db073c8ca

    SHA1

    a99634427326c35db30325631a3533cedd9ef475

    SHA256

    66e549d330774f861ebb25dbc7653b0adfae2b8851d8ad9e1190c3087b0d49df

    SHA512

    b3bee01bb9b08480977be2b7e54388d1c92d43cf2ca51b7f8f4b214cb4075e5a2edd0a2835e739235a807f09afc5ff3239911940521447c63993a73b2bbbd4f3

  • C:\v1.log

    Filesize

    235B

    MD5

    96dffcb801321be215b07197a6fa8ad5

    SHA1

    47eae36636197d14e44e05ad1f01daed5aecaa5a

    SHA256

    1599287e287541fce2cdffd5c71d344253300f0170dbb2fc14aa6947cd56ee97

    SHA512

    247c0adae53d93dd0e9d838d3830f086128c48d3195509e34e03fcd1237f0e1ea501f17e01e5e52da7aeda0b893abf3bb73d7ac1fc4190114065b7c7d914ce1b

  • memory/2516-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2516-42-0x0000000051000000-0x0000000051064000-memory.dmp

    Filesize

    400KB