Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2024, 02:25

General

  • Target

    7ff818c2d6bb4329ebc91219c45807e5b96e49bca7e0960a8b71e7e03b9cec60.exe

  • Size

    696KB

  • MD5

    5ff8f2113356c908d9b58d930f55f210

  • SHA1

    e8b8b6e3feb904bf8e463b744f7763e172866c56

  • SHA256

    7ff818c2d6bb4329ebc91219c45807e5b96e49bca7e0960a8b71e7e03b9cec60

  • SHA512

    c407713e5155eb184bd78593bef578cbdfcb5a05be14ba3edfccf1a9af4a1cae9dee4eda1b64b96a851fc50515d58dfaaf8fa6bea063706fed17ee33fd67096d

  • SSDEEP

    12288:YfVUl+WsI1nI1u6cP2YdeCpAYHwC8WkOEYhErDk5skbE22dEy3HG5N7FlFHlnGUt:sV6+WsgI8ReYtqcEOE95HGLBdGw

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7ff818c2d6bb4329ebc91219c45807e5b96e49bca7e0960a8b71e7e03b9cec60.exe
    "C:\Users\Admin\AppData\Local\Temp\7ff818c2d6bb4329ebc91219c45807e5b96e49bca7e0960a8b71e7e03b9cec60.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\gdi32.dll

    Filesize

    437KB

    MD5

    719b51d853f1d8a5b2d704db5736bee2

    SHA1

    b274871c8e03dd13b2c1099763b3ecb919a751b1

    SHA256

    56112f1fb0b4cb0d81bc58c8be898ad644b8e0fc3d2beac6635c200b69321aa2

    SHA512

    dc25f57a88e1b1edc3b36e6ac543181bb1103b392f33b2e288e86cd68ab89f232dcf7328b030543336a0a5223674a4ee6959025e0d508e85af96636c97205fa8

  • memory/2696-0-0x000000007463E000-0x000000007463F000-memory.dmp

    Filesize

    4KB

  • memory/2696-1-0x0000000000EA0000-0x0000000000F58000-memory.dmp

    Filesize

    736KB

  • memory/2696-2-0x0000000000310000-0x0000000000316000-memory.dmp

    Filesize

    24KB

  • memory/2696-7-0x00000000762B0000-0x0000000076371000-memory.dmp

    Filesize

    772KB

  • memory/2696-8-0x0000000074630000-0x0000000074D1E000-memory.dmp

    Filesize

    6.9MB