Analysis

  • max time kernel
    30s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-02-2025 11:34

General

  • Target

    4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281.exe

  • Size

    248KB

  • MD5

    0a4b7e409a27aa973a66eba20bf662dd

  • SHA1

    4e1abafdfe6e9c0cd30161bb6b46431c3c2d15cf

  • SHA256

    4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281

  • SHA512

    4f07bdc3ad3c1322da1b5207eca1fd84b3f5f5d3814fd569d37281680b6524e87079e70bba295cef422b3b2e42e805d5f59b1b293cd3dcb711d8ea26458d28dc

  • SSDEEP

    3072:etsLhXr6AQuO5MRDZ5ZuI80fP1yjQUEcOMyNx80oB1WtEkdGFEk0pyyNxRmvh:fGD5MR5HZrbbxt+WtzdGGk0UyDy

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281.exe
    "C:\Users\Admin\AppData\Local\Temp\4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2760-2-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2760-14-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/2760-4-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2760-26-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/2760-58-0x00000000003A0000-0x00000000003A1000-memory.dmp

    Filesize

    4KB

  • memory/2760-38-0x0000000000360000-0x0000000000361000-memory.dmp

    Filesize

    4KB

  • memory/2760-197-0x0000000000440000-0x0000000000442000-memory.dmp

    Filesize

    8KB

  • memory/2760-195-0x00000000003F0000-0x00000000003F2000-memory.dmp

    Filesize

    8KB

  • memory/2760-68-0x00000000003C0000-0x00000000003C1000-memory.dmp

    Filesize

    4KB

  • memory/2760-43155-0x0000000000450000-0x0000000000452000-memory.dmp

    Filesize

    8KB

  • memory/2760-43153-0x00000000003F0000-0x00000000003F2000-memory.dmp

    Filesize

    8KB