Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    27/01/2025, 15:11

General

  • Target

    08d4e8e53c62fdefd593f1baf3ad4455dabbd737d1fec25c95c106d5e8051845N.exe

  • Size

    337KB

  • MD5

    d8b0d175ceb66ee89e7327fbfa0c1500

  • SHA1

    233262b76bc58b89b989400c6293f984b00e5fa9

  • SHA256

    08d4e8e53c62fdefd593f1baf3ad4455dabbd737d1fec25c95c106d5e8051845

  • SHA512

    5b7051eb075168ce053a75e5bcdb1daa96fbef325b2f66555c2266283bc12780cd953b6e788629571c61c6ee555b0c9812adb00c628443444f6eb08fecb19707

  • SSDEEP

    6144:x7jduR+zuIBwIL+xy53kyIxinvGdHDsLZf4/6NRBkQ3fi8Ol:hvH/L+xy5PIxiqjmg2RBh3

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\08d4e8e53c62fdefd593f1baf3ad4455dabbd737d1fec25c95c106d5e8051845N.exe
    "C:\Users\Admin\AppData\Local\Temp\08d4e8e53c62fdefd593f1baf3ad4455dabbd737d1fec25c95c106d5e8051845N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2344

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2344-0-0x0000000000400000-0x00000000004E3000-memory.dmp

          Filesize

          908KB

        • memory/2344-1-0x0000000000400000-0x00000000004E3000-memory.dmp

          Filesize

          908KB

        • memory/2344-4-0x0000000000400000-0x00000000004E3000-memory.dmp

          Filesize

          908KB

        • memory/2344-5-0x0000000000400000-0x00000000004E3000-memory.dmp

          Filesize

          908KB