Analysis

  • max time kernel
    119s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    01-01-2025 13:28

General

  • Target

    7d22e346cbe57bb3e846a3fd1f2b64c6af8b60ed4b531419d0085ffd5b06c17a.exe

  • Size

    308KB

  • MD5

    3a8e61de7eca7b406c4d252a1fba1447

  • SHA1

    c9d3b12d7b578b2de6d35b1041875150b1e15fd2

  • SHA256

    7d22e346cbe57bb3e846a3fd1f2b64c6af8b60ed4b531419d0085ffd5b06c17a

  • SHA512

    8c9934781991e491ff79be579911f90114831d8a0ccffeae6a6f242fbcf94dd0e2dd07bbca0e0059b3611239e68df231ef7849b407358307101fc4c4b7bdcbb4

  • SSDEEP

    3072:tCtNsQBMVlV7zPkloChL/bmYkRwy0ZaMPdWTx4koqO1hxG3ehZgNa4Etv20dGJI:smQeV77e/bOyy0hksrG37/EAW

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d22e346cbe57bb3e846a3fd1f2b64c6af8b60ed4b531419d0085ffd5b06c17a.exe
    "C:\Users\Admin\AppData\Local\Temp\7d22e346cbe57bb3e846a3fd1f2b64c6af8b60ed4b531419d0085ffd5b06c17a.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Users\Admin\AppData\Local\Temp\7d22e346cbe57bb3e846a3fd1f2b64c6af8b60ed4b531419d0085ffd5b06c17a.exe
      "C:\Users\Admin\AppData\Local\Temp\7d22e346cbe57bb3e846a3fd1f2b64c6af8b60ed4b531419d0085ffd5b06c17a.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2176
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
        dw20.exe -x -s 752
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1964-0-0x0000000074A41000-0x0000000074A42000-memory.dmp

    Filesize

    4KB

  • memory/1964-1-0x0000000074A40000-0x0000000074FEB000-memory.dmp

    Filesize

    5.7MB

  • memory/1964-2-0x0000000074A40000-0x0000000074FEB000-memory.dmp

    Filesize

    5.7MB

  • memory/1964-20-0x0000000074A40000-0x0000000074FEB000-memory.dmp

    Filesize

    5.7MB

  • memory/2176-17-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2176-18-0x0000000074A40000-0x0000000074FEB000-memory.dmp

    Filesize

    5.7MB

  • memory/2176-15-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2176-13-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2176-3-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2176-19-0x0000000074A40000-0x0000000074FEB000-memory.dmp

    Filesize

    5.7MB

  • memory/2176-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2176-7-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2176-5-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2176-21-0x0000000074A40000-0x0000000074FEB000-memory.dmp

    Filesize

    5.7MB

  • memory/2176-23-0x0000000074A40000-0x0000000074FEB000-memory.dmp

    Filesize

    5.7MB

  • memory/2668-22-0x00000000005C0000-0x00000000005C1000-memory.dmp

    Filesize

    4KB