Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    21/12/2024, 14:46

General

  • Target

    6c46d81ae8d4c5b37c8d774880d6dff92d3df4286c413962d505d747555166bc.exe

  • Size

    575KB

  • MD5

    9414da6696e7eb14b8f5b19ea06f0c73

  • SHA1

    a72e3e4232b61824bde86b04d9001357dce17165

  • SHA256

    6c46d81ae8d4c5b37c8d774880d6dff92d3df4286c413962d505d747555166bc

  • SHA512

    1ebab5b65b966ac2a1186c9741c55513fb078b605e25d8ac8c1fad9400cacf6c4332cc9629adbcbf43c1477b7faa400fde69bcfc671a715d7d503c34eb866985

  • SSDEEP

    6144:XNeZ2MAgwP2oKh0IUUCBbNp3BJWdojCW7sfI5jw1vfSNMmH:XNjMoKhDUxBbLWijC6sfkjjn

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c46d81ae8d4c5b37c8d774880d6dff92d3df4286c413962d505d747555166bc.exe
    "C:\Users\Admin\AppData\Local\Temp\6c46d81ae8d4c5b37c8d774880d6dff92d3df4286c413962d505d747555166bc.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2848

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads