Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-01-2025 18:55

General

  • Target

    977545a82597579ca14991cc2117466b4a8a8015123abb531589161c0f5b45f4.exe

  • Size

    65KB

  • MD5

    83e74bf86e47d5c6935dd34a30359313

  • SHA1

    995931a943252008d8ac908802d428222f97629a

  • SHA256

    977545a82597579ca14991cc2117466b4a8a8015123abb531589161c0f5b45f4

  • SHA512

    de01c44c81476f7ee55b30612db6f4816b291a9916f315db8ac5a63b315989fd0796fba045434a3d10458018d06ecbebbd595b37879225faddc596aaa2a690ed

  • SSDEEP

    1536:eqM776oN36tMQviFw1NXkgBnvbNfLteF3nLrB9z3ndaF9biS9vM:ex776oN36tMQviFC5NBnRfWl9ztaF9bK

Malware Config

Signatures

  • Drops startup file 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\977545a82597579ca14991cc2117466b4a8a8015123abb531589161c0f5b45f4.exe
    "C:\Users\Admin\AppData\Local\Temp\977545a82597579ca14991cc2117466b4a8a8015123abb531589161c0f5b45f4.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2652-0-0x0000000074281000-0x0000000074282000-memory.dmp

    Filesize

    4KB

  • memory/2652-1-0x0000000074280000-0x000000007482B000-memory.dmp

    Filesize

    5.7MB

  • memory/2652-2-0x0000000074280000-0x000000007482B000-memory.dmp

    Filesize

    5.7MB

  • memory/2652-6-0x0000000074280000-0x000000007482B000-memory.dmp

    Filesize

    5.7MB

  • memory/2652-7-0x0000000074280000-0x000000007482B000-memory.dmp

    Filesize

    5.7MB