Analysis

  • max time kernel
    74s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2025, 01:22

General

  • Target

    ee2103a5f8e6314618a8dfafe16185d2542cf9ed2ab7cb172bdcdc3b415a9027N.exe

  • Size

    65KB

  • MD5

    7b6de1f4e80f5f0e56db56f2095ae7a0

  • SHA1

    13ada473813ec380ba5ea8cfac2457a753d88b82

  • SHA256

    ee2103a5f8e6314618a8dfafe16185d2542cf9ed2ab7cb172bdcdc3b415a9027

  • SHA512

    7259a557ee2f186887ec0e40c08fa7bf6fe51d7fb6b9a930c5a876afb5c1534efc3bd0b59d454ce2b6b54e914ced687b298c016c2e467dee090cf1c6365085ae

  • SSDEEP

    1536:nIi1xBBZ3ad5Wj9thVmZAl8FL0gam8qUN/ffRaOug:Ii1xBxjanF7aTqUuO9

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee2103a5f8e6314618a8dfafe16185d2542cf9ed2ab7cb172bdcdc3b415a9027N.exe
    "C:\Users\Admin\AppData\Local\Temp\ee2103a5f8e6314618a8dfafe16185d2542cf9ed2ab7cb172bdcdc3b415a9027N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Users\Admin\AppData\Local\Temp\ee2103a5f8e6314618a8dfafe16185d2542cf9ed2ab7cb172bdcdc3b415a9027N.exe
      C:\Users\Admin\AppData\Local\Temp\ee2103a5f8e6314618a8dfafe16185d2542cf9ed2ab7cb172bdcdc3b415a9027N.exe
      2⤵
        PID:3000

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1740-0-0x0000000074DCE000-0x0000000074DCF000-memory.dmp

      Filesize

      4KB

    • memory/1740-1-0x00000000001B0000-0x00000000001C6000-memory.dmp

      Filesize

      88KB

    • memory/1740-2-0x0000000074DC0000-0x00000000754AE000-memory.dmp

      Filesize

      6.9MB

    • memory/1740-3-0x00000000004E0000-0x00000000004EA000-memory.dmp

      Filesize

      40KB

    • memory/1740-8-0x0000000074DC0000-0x00000000754AE000-memory.dmp

      Filesize

      6.9MB

    • memory/1740-9-0x0000000074DC0000-0x00000000754AE000-memory.dmp

      Filesize

      6.9MB

    • memory/1740-10-0x0000000074DC0000-0x00000000754AE000-memory.dmp

      Filesize

      6.9MB