Analysis

  • max time kernel
    71s
  • max time network
    72s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2024 05:34

General

  • Target

    sample.exe

  • Size

    10KB

  • MD5

    f33c75710d0e0463a2528e619c2ee382

  • SHA1

    4d2dd071fe274e6a8696448c21eeeecc0cf07e6d

  • SHA256

    ec7dd08d03d5d4142c82fc04cea7e948d05641b0a3008a0d8a00b0421b5b04f9

  • SHA512

    154242d9880aa6a4f56e697643da089db121fcb1fb8fe7748efed650a6446d259be45aa58ec76f447d2c4bb5649f01acd2304d86321ec8720dfa1182ce0d5bfe

  • SSDEEP

    96:zMCbgvMlD60OX6QRdR/9DCop+BYA8v1cVKV15uJxGE9YUBz2qh3C7tCEfq:AeNlD5wrldp+OF0JxTmUBzthc

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\sample.exe
    "C:\Users\Admin\AppData\Local\Temp\sample.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads