Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-01-2025 07:36

General

  • Target

    e617b6f2693165f8d2def1bc6da8f614654ce49383170fdca1891da85d333554N.exe

  • Size

    591KB

  • MD5

    7ad563d1d370af1e8d8e5b6cb5d8ce00

  • SHA1

    066d80afc7a9ec1d9f9132973c130e134757e4d8

  • SHA256

    e617b6f2693165f8d2def1bc6da8f614654ce49383170fdca1891da85d333554

  • SHA512

    06f2fb0f30cbb15a46f4a414eff01db68f9a820a4ad6a0b1f93f61290cef9e6e3ad16c7277ea4d0976e607c80fc5ffc6a30b81abc4d5a51657a458fb8ed75d6f

  • SSDEEP

    6144:lHagJcX+kTQvQDfQFkw01BJWJP98V24rIl3PafNSINywRtF/NZAWP6gH1z7OStK:1cO3QDPBMJKVO/afzNywRt5NmY6E

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e617b6f2693165f8d2def1bc6da8f614654ce49383170fdca1891da85d333554N.exe
    "C:\Users\Admin\AppData\Local\Temp\e617b6f2693165f8d2def1bc6da8f614654ce49383170fdca1891da85d333554N.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2716
    • C:\Users\Admin\AppData\Local\Temp\e617b6f2693165f8d2def1bc6da8f614654ce49383170fdca1891da85d333554N.exe
      C:\Users\Admin\AppData\Local\Temp\e617b6f2693165f8d2def1bc6da8f614654ce49383170fdca1891da85d333554N.exe
      2⤵
        PID:2844

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2716-0-0x0000000074B41000-0x0000000074B42000-memory.dmp

      Filesize

      4KB

    • memory/2716-1-0x0000000074B40000-0x00000000750EB000-memory.dmp

      Filesize

      5.7MB

    • memory/2716-2-0x0000000074B40000-0x00000000750EB000-memory.dmp

      Filesize

      5.7MB

    • memory/2716-4-0x0000000074B40000-0x00000000750EB000-memory.dmp

      Filesize

      5.7MB